{
    "file_item": {
        "filepath": "security-advisories",
        "filename": "CERT-EU-SA2021-068.pdf"
    },
    "title": "Fortinet Fortiweb Vulnerability",
    "serial_number": "2021-068",
    "publish_date": "13-12-2021 10:57:00",
    "description": "On December 7th, Fortinet PSIRT released an advisory to address a heap-based buffer overflow vulnerability in FortiWeb. This vulnerability (CVE-2021-43071) allows an attacker to execute arbitrary code and commands on the affected product.",
    "url_title": "2021-068",
    "content_markdown": "---\ntitle: 'Fortinet Fortiweb Vulnerability'\nversion: '1.0'\nnumber: '2021-068'\ndate: 'December 13, 2021'\n---\n\n_History:_\n\n* _13/12/2021 --- v1.0 -- Initial publication_\n\n# Summary\n\nOn December 7th, Fortinet PSIRT released an advisory to address a heap-based buffer overflow vulnerability in FortiWeb. This vulnerability (CVE-2021-43071) allows an attacker to execute arbitrary code and commands on the affected product [1].\n\n# Technical Details\n\nThe vulnerability is due to an heap-based buffer overflow in API v1.0 controller. To exploit this vulnerability, an attacker can send crafted HTTP requests to the `LogAccess` and `LogReport API` controller to execute arbitrary code or commands.\n\n# Affected Products\n\nThe affected products are the following:\n\n- FortiWeb version 6.4.1 and below.\n- FortiWeb version 6.3.16 and below.\n- FortiWeb version 6.2.6 and below.\n\n# Recommendations\n\nCERT-EU strongly recommends to upgrade to the following versions:\n\n- FortiWeb version 7.0.0 or above.\n- FortiWeb version 6.4.2 or above.\n- FortiWeb version 6.3.17 or above.\n\nFortinet PSIRT also precise that the fix for FortiWeb versions 6.2 has to be confirmed.\n\n# References\n\n[1] <https://www.fortiguard.com/psirt/FG-IR-21-188>\n",
    "content_html": "<p><em>History:</em></p><ul><li><em>13/12/2021 --- v1.0 -- Initial publication</em></li></ul><h2 id=\"summary\">Summary</h2><p>On December 7th, Fortinet PSIRT released an advisory to address a heap-based buffer overflow vulnerability in FortiWeb. This vulnerability (CVE-2021-43071) allows an attacker to execute arbitrary code and commands on the affected product [1].</p><h2 id=\"technical-details\">Technical Details</h2><p>The vulnerability is due to an heap-based buffer overflow in API v1.0 controller. To exploit this vulnerability, an attacker can send crafted HTTP requests to the <code>LogAccess</code> and <code>LogReport API</code> controller to execute arbitrary code or commands.</p><h2 id=\"affected-products\">Affected Products</h2><p>The affected products are the following:</p><ul><li>FortiWeb version 6.4.1 and below.</li><li>FortiWeb version 6.3.16 and below.</li><li>FortiWeb version 6.2.6 and below.</li></ul><h2 id=\"recommendations\">Recommendations</h2><p>CERT-EU strongly recommends to upgrade to the following versions:</p><ul><li>FortiWeb version 7.0.0 or above.</li><li>FortiWeb version 6.4.2 or above.</li><li>FortiWeb version 6.3.17 or above.</li></ul><p>Fortinet PSIRT also precise that the fix for FortiWeb versions 6.2 has to be confirmed.</p><h2 id=\"references\">References</h2><p>[1] <a rel=\"noopener\" target=\"_blank\" href=\"https://www.fortiguard.com/psirt/FG-IR-21-188\">https://www.fortiguard.com/psirt/FG-IR-21-188</a></p>",
    "licence": {
        "title": "Creative Commons Attribution 4.0 International (CC-BY 4.0)",
        "link": "https://creativecommons.org/licenses/by/4.0/",
        "restrictions": "https://cert.europa.eu/legal-notice",
        "author": "The Cybersecurity Service for the Union institutions, bodies, offices and agencies"
    }
}