This CPE summary could be partial or incomplete. Please contact us for a detailed listing.

Summary

Detail
Vendor Fortinet First view 2020-09-24
Product Fortitester Last view 2025-01-22
Version Type Application
Update  
Edition  
Language  
Sofware Edition  
Target Software  
Target Hardware  
Other  

Activity : Overall

COMMON PLATFORM ENUMERATION: Repartition per Version

CPE Name Affected CVE
cpe:2.3:a:fortinet:fortitester:3.8.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.7.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.6.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.5.1:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.5.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.4.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.3.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.3.1:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.2.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.1.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:3.0.0:*:*:*:*:*:*:* 15
cpe:2.3:a:fortinet:fortitester:2.8.0:*:*:*:*:*:*:* 14
cpe:2.3:a:fortinet:fortitester:2.9.0:*:*:*:*:*:*:* 14
cpe:2.3:a:fortinet:fortitester:2.7.0:*:*:*:*:*:*:* 14
cpe:2.3:a:fortinet:fortitester:2.6.0:*:*:*:*:*:*:* 14
cpe:2.3:a:fortinet:fortitester:2.5.0:*:*:*:*:*:*:* 14
cpe:2.3:a:fortinet:fortitester:2.4.1:*:*:*:*:*:*:* 14
cpe:2.3:a:fortinet:fortitester:2.4.0:*:*:*:*:*:*:* 14
cpe:2.3:a:fortinet:fortitester:2.3.0:*:*:*:*:*:*:* 14
cpe:2.3:a:fortinet:fortitester:*:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:4.2.0:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:4.1.1:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:4.1.0:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:4.0.0:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:3.9.1:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:3.9.0:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:3.7.1:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:7.1.0:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:7.0.0:*:*:*:*:*:*:* 13
cpe:2.3:a:fortinet:fortitester:3.9.2:*:*:*:*:*:*:* 11
cpe:2.3:a:fortinet:fortitester:4.2.1:*:*:*:*:*:*:* 10
cpe:2.3:a:fortinet:fortitester:7.2.1:*:*:*:*:*:*:* 5
cpe:2.3:a:fortinet:fortitester:7.2.0:*:*:*:*:*:*:* 5
cpe:2.3:a:fortinet:fortitester:7.1.1:*:*:*:*:*:*:* 5
cpe:2.3:a:fortinet:fortitester:7.2.2:*:*:*:*:*:*:* 4
cpe:2.3:a:fortinet:fortitester:7.2.3:*:*:*:*:*:*:* 4

Related : CVE

  Date Alert Description
6.1 2025-01-22 CVE-2022-23439

A externally controlled reference to a resource in another sphere in Fortinet FortiManager before version 7.4.3, FortiMail before version 7.0.3, FortiAnalyzer before version 7.4.3, FortiVoice version 7.0.0, 7.0.1 and before 6.4.8, FortiProxy before version 7.0.4, FortiRecorder version 6.4.0 through 6.4.2 and before 6.0.10, FortiAuthenticator version 6.4.0 through 6.4.1 and before 6.3.3, FortiNDR version 7.2.0 before 7.1.0, FortiWLC before version 8.6.4, FortiPortal before version 6.0.9, FortiOS version 7.2.0 and before 7.0.5, FortiADC version 7.0.0 through 7.0.1 and before 6.2.3 , FortiDDoS before version 5.5.1, FortiDDoS-F before version 6.3.3, FortiTester before version 7.2.1, FortiSOAR before version 7.2.2 and FortiSwitch before version 6.3.3 allows attacker to poison web caches via crafted HTTP requests, where the `Host` header points to an arbitrary webserver

7.8 2023-12-13 CVE-2023-40716

An improper neutralization of special elements used in an OS command vulnerability [CWE-78] Â in the command line interpreter of FortiTester 2.3.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments when running execute restore/backup .

7.8 2023-09-13 CVE-2023-40717

A use of hard-coded credentials vulnerability [CWE-798] in FortiTester 2.3.0 through 7.2.3 may allow an attacker who managed to get a shell on the device to access the database via shell commands.

5.5 2023-09-13 CVE-2023-40715

A cleartext storage of sensitive information vulnerability [CWE-312] in FortiTester 2.3.0 through 7.2.3 may allow an attacker with access to the DB contents to retrieve the plaintext password of external servers configured in the device.

7.8 2023-09-13 CVE-2023-36642

An improper neutralization of special elements used in an OS command vulnerability [CWE-78]Â in the management interface of FortiTester 3.0.0 through 7.2.3 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.

8.8 2023-01-03 CVE-2022-35845

Multiple improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in FortiTester 7.1.0, 7.0 all versions, 4.0.0 through 4.2.0, 2.3.0 through 3.9.1 may allow an authenticated attacker to execute arbitrary commands in the underlying shell.

6.7 2022-11-02 CVE-2022-38372

A hidden functionality vulnerability [CWE-1242] in FortiTester CLI 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow a local, privileged user to obtain a root shell on the device via an undocumented command.

7.8 2022-11-02 CVE-2022-33870

An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the command line interpreter of FortiTester 3.0.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to existing commands.

9.8 2022-10-18 CVE-2022-35846

An improper restriction of excessive authentication attempts vulnerability [CWE-307] in FortiTester Telnet port 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated attacker to guess the credentials of an admin user via a brute force attack.

7.2 2022-10-18 CVE-2022-35844

An improper neutralization of special elements used in an OS command vulnerability [CWE-78] in the management interface of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an authenticated attacker to execute unauthorized commands via specifically crafted arguments to commands of the certificate import feature.

9.8 2022-10-18 CVE-2022-33874

An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in SSH login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated remote attacker to execute arbitrary command in the underlying shell.

9.8 2022-10-18 CVE-2022-33873

An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in Console login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated attacker to execute arbitrary command in the underlying shell.

9.8 2022-10-18 CVE-2022-33872

An improper neutralization of special elements used in an OS Command ('OS Command Injection') vulnerabilities [CWE-78] in Telnet login components of FortiTester 2.3.0 through 3.9.1, 4.0.0 through 4.2.0, 7.0.0 through 7.1.0 may allow an unauthenticated remote attacker to execute arbitrary command in the underlying shell.

8.8 2020-09-24 CVE-2020-12817

An improper neutralization of input vulnerability in FortiAnalyzer before 6.4.1 and 6.2.5 may allow a remote authenticated attacker to inject script related HTML tags via Name parameter of Storage Connectors.

5.4 2020-09-24 CVE-2020-12815

An improper neutralization of input vulnerability in FortiTester before 3.9.0 may allow a remote authenticated attacker to inject script related HTML tags via IPv4/IPv6 address fields.

CWE : Common Weakness Enumeration

%idName
53% (7) CWE-78 Improper Sanitization of Special Elements used in an OS Command ('O...
15% (2) CWE-79 Failure to Preserve Web Page Structure ('Cross-site Scripting')
7% (1) CWE-798 Use of Hard-coded Credentials
7% (1) CWE-610 Externally Controlled Reference to a Resource in Another Sphere
7% (1) CWE-312 Cleartext Storage of Sensitive Information
7% (1) CWE-307 Improper Restriction of Excessive Authentication Attempts