A cross-site request forgery (CSRF) in Fortinet FortiVoiceEnterprise version 6.4.x, 6.0.x, FortiSwitch version 7.0.0 through 7.0.4, 6.4.0 through 6.4.10, 6.2.0 through 6.2.7, 6.0.x, FortiMail version 7.0.0 through 7.0.3, 6.4.0 through 6.4.6, 6.2.x, 6.0.x FortiRecorder version 6.4.0 through 6.4.2, 6.0.x, 2.7.x, 2.6.x, FortiNDR version 1.x.x allows a remote unauthenticated attacker to execute commands on the CLI via tricking an authenticated administrator to execute malicious GET requests.
The web application does not, or can not, sufficiently verify whether a well-formed, valid, consistent request was intentionally provided by the user who submitted the request.
Name | Vendor | Start Version | End Version |
---|---|---|---|
Fortiai | Fortinet | 1.1.0 (including) | 1.1.0 (including) |
Fortiai | Fortinet | 1.5.3 (including) | 1.5.3 (including) |
Fortimail | Fortinet | 6.0.0 (including) | 6.0.12 (including) |
Fortimail | Fortinet | 6.2.0 (including) | 6.2.9 (including) |
Fortimail | Fortinet | 6.4.0 (including) | 6.4.6 (including) |
Fortimail | Fortinet | 7.0.0 (including) | 7.0.3 (including) |
Fortindr | Fortinet | 7.0.0 (including) | 7.0.4 (including) |
Fortindr | Fortinet | 7.1.0 (including) | 7.1.0 (including) |
Fortirecorder | Fortinet | 2.6.0 (including) | 2.6.3 (including) |
Fortirecorder | Fortinet | 2.7.0 (including) | 2.7.7 (including) |
Fortirecorder | Fortinet | 6.0.0 (including) | 6.0.11 (including) |
Fortirecorder | Fortinet | 6.4.0 (including) | 6.4.2 (including) |
Fortivoice | Fortinet | 6.0.0 (including) | 6.0.11 (including) |
Fortivoice | Fortinet | 6.4.0 (including) | 6.4.7 (including) |
Fortiswitch | Fortinet | 6.0.0 (including) | 6.0.7 (including) |
Fortiswitch | Fortinet | 6.2.0 (including) | 6.2.7 (including) |
Fortiswitch | Fortinet | 6.4.0 (including) | 6.4.10 (including) |
Fortiswitch | Fortinet | 7.0.0 (including) | 7.0.4 (including) |