An improper control of generation of code ('code injection') in Fortinet FortiClientLinux version 7.2.0, 7.0.6 through 7.0.10 and 7.0.3 through 7.0.4 allows attacker to execute unauthorized code or commands via tricking a FortiClientLinux user into visiting a malicious website
References
| Link | Resource |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-087 | Vendor Advisory |
| https://fortiguard.com/psirt/FG-IR-23-087 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
17 Jan 2025, 17:08
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://fortiguard.com/psirt/FG-IR-23-087 - Vendor Advisory | |
| CPE | cpe:2.3:a:fortinet:forticlient:*:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.3:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.0.4:*:*:*:*:linux:*:* cpe:2.3:a:fortinet:forticlient:7.2.0:*:*:*:*:linux:*:* |
|
| First Time |
Fortinet
Fortinet forticlient |
Information
Published : 2024-04-09 15:15
Updated : 2025-01-17 17:08
NVD link : CVE-2023-45590
Mitre link : CVE-2023-45590
CVE.ORG link : CVE-2023-45590
JSON object : View
Products Affected
fortinet
- forticlient
CWE
CWE-94
Improper Control of Generation of Code ('Code Injection')
