Vulnerability Details CVE-2022-30303
An improper neutralization of special elements used in an os command ('OS Command Injection') [CWE-78] in FortiWeb 7.0.0 through 7.0.1, 6.3.0 through 6.3.19, 6.4 all versions may allow an authenticated attacker to execute arbitrary shell code as `root` user via crafted HTTP requests.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.016
EPSS Ranking 80.8%
CVSS Severity
CVSS v3 Score 8.8
Products affected by CVE-2022-30303
-
cpe:2.3:a:fortinet:fortiweb:6.3.0
-
cpe:2.3:a:fortinet:fortiweb:6.3.1
-
cpe:2.3:a:fortinet:fortiweb:6.3.10
-
cpe:2.3:a:fortinet:fortiweb:6.3.11
-
cpe:2.3:a:fortinet:fortiweb:6.3.12
-
cpe:2.3:a:fortinet:fortiweb:6.3.13
-
cpe:2.3:a:fortinet:fortiweb:6.3.14
-
cpe:2.3:a:fortinet:fortiweb:6.3.15
-
cpe:2.3:a:fortinet:fortiweb:6.3.16
-
cpe:2.3:a:fortinet:fortiweb:6.3.17
-
cpe:2.3:a:fortinet:fortiweb:6.3.18
-
cpe:2.3:a:fortinet:fortiweb:6.3.19
-
cpe:2.3:a:fortinet:fortiweb:6.3.2
-
cpe:2.3:a:fortinet:fortiweb:6.3.3
-
cpe:2.3:a:fortinet:fortiweb:6.3.4
-
cpe:2.3:a:fortinet:fortiweb:6.3.5
-
cpe:2.3:a:fortinet:fortiweb:6.3.6
-
cpe:2.3:a:fortinet:fortiweb:6.3.7
-
cpe:2.3:a:fortinet:fortiweb:6.3.8
-
cpe:2.3:a:fortinet:fortiweb:6.3.9
-
cpe:2.3:a:fortinet:fortiweb:6.4.0
-
cpe:2.3:a:fortinet:fortiweb:6.4.1
-
cpe:2.3:a:fortinet:fortiweb:6.4.2
-
cpe:2.3:a:fortinet:fortiweb:7.0.0
-
cpe:2.3:a:fortinet:fortiweb:7.0.1