Learn about CVE-2023-48791, a high-severity vulnerability in FortiPortal versions 7.2.0 and below, allowing remote attackers to execute unauthorized commands. Follow mitigation steps to secure your system.
This article provides detailed information about CVE-2023-48791, including its impact, technical details, mitigation steps, and more.
Understanding CVE-2023-48791
CVE-2023-48791 is a vulnerability found in FortiPortal versions 7.2.0 and below, allowing a remote authenticated attacker to execute unauthorized commands through specially crafted arguments.
What is CVE-2023-48791?
The vulnerability (CWE-77) involves an improper neutralization of special elements in a command, leading to command injection in FortiPortal versions 7.2.0 and 7.0.6 and below.
The Impact of CVE-2023-48791
With a high CVSS base score of 7.9, this vulnerability can result in the execution of unauthorized commands by a remote authenticated attacker with certain permissions.
Technical Details of CVE-2023-48791
The following technical details outline the vulnerability:
Vulnerability Description
An improper neutralization of special elements in a command allows a remote authenticated attacker to execute unauthorized commands through specially crafted arguments.
Affected Systems and Versions
FortiPortal versions 7.2.0, 7.0.6, and below are affected by this vulnerability.
Exploitation Mechanism
A remote authenticated attacker with at least read/write permissions can exploit this vulnerability by injecting unauthorized commands via the Schedule System Backup page field.
Mitigation and Prevention
To secure your system from CVE-2023-48791, consider the following mitigation steps:
Immediate Steps to Take
Long-Term Security Practices
Implement strict access controls, monitor system activity, and regularly update your FortiPortal installation to prevent potential attacks.
Patching and Updates
Stay informed about security patches and updates provided by Fortinet to address known vulnerabilities.