CVE-2021-32590
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
Multiple improper neutralization of special elements used in an SQL command vulnerabilities in FortiPortal 6.0.0 through 6.0.4, 5.3.0 through 5.3.5, 5.2.0 through 5.2.5, and 4.2.2 and earlier may allow an attacker with regular user's privileges to execute arbitrary commands on the underlying SQL database via specifically crafted HTTP requests.
Múltiples vulnerabilidades de neutralización inapropiada de elementos especiales usados en un comando SQL en FortiPortal versiones 6.0.0 hasta 6.0.4, versiones 5.3.0 hasta 5.3.5, versiones 5.2.0 hasta 5.2.5, y versiones 4.2.2 y anteriores pueden permitir a un atacante con privilegios de usuario regular ejecutar comandos arbitrarios en la base de datos SQL subyacente por medio de peticiones HTTP específicamente diseñadas
CVSS Scores
SSVC
- Decision:Track*
Timeline
- 2021-05-11 CVE Reserved
- 2021-08-04 CVE Published
- 2023-03-07 EPSS Updated
- 2024-10-25 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-89: Improper Neutralization of Special Elements used in an SQL Command ('SQL Injection')
CAPEC
References (1)
URL | Tag | Source |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|---|---|
https://fortiguard.com/advisory/FG-IR-21-084 | 2021-08-11 |
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 3.2.0 <= 3.2.2 Search vendor "Fortinet" for product "Fortiportal" and version " >= 3.2.0 <= 3.2.2" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 4.0.0 <= 4.0.4 Search vendor "Fortinet" for product "Fortiportal" and version " >= 4.0.0 <= 4.0.4" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 4.1.0 <= 4.1.2 Search vendor "Fortinet" for product "Fortiportal" and version " >= 4.1.0 <= 4.1.2" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 4.2.0 <= 4.2.4 Search vendor "Fortinet" for product "Fortiportal" and version " >= 4.2.0 <= 4.2.4" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 5.0.0 <= 5.0.3 Search vendor "Fortinet" for product "Fortiportal" and version " >= 5.0.0 <= 5.0.3" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 5.1.0 <= 5.1.2 Search vendor "Fortinet" for product "Fortiportal" and version " >= 5.1.0 <= 5.1.2" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 5.2.0 < 5.2.6 Search vendor "Fortinet" for product "Fortiportal" and version " >= 5.2.0 < 5.2.6" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 5.3.0 < 5.3.6 Search vendor "Fortinet" for product "Fortiportal" and version " >= 5.3.0 < 5.3.6" | - |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | Fortiportal Search vendor "Fortinet" for product "Fortiportal" | >= 6.0.0 < 6.0.5 Search vendor "Fortinet" for product "Fortiportal" and version " >= 6.0.0 < 6.0.5" | - |
Affected
|