FortiSandbox SQLi (CWE-89) v3.0-4.2 allows file read via HTTP
CVE-2022-27485 Published on April 11, 2023
A improper neutralization of special elements used in an sql command ('sql injection') vulnerability [CWE-89] in Fortinet FortiSandbox version 4.2.0, 4.0.0 through 4.0.2, 3.2.0 through 3.2.3, 3.1.x and 3.0.x allows a remote and authenticated attacker with read permission to retrieve arbitrary files from the underlying Linux system via a crafted HTTP request.
Vulnerability Analysis
CVE-2022-27485 can be exploited with network access, and requires small amount of user privileges. This vulnerability is considered to have a low attack complexity. The potential impact of an exploit of this vulnerability is considered to have a high impact on confidentiality, with no impact on integrity and availability.
Weakness Type
What is a SQL Injection Vulnerability?
The software constructs all or part of an SQL command using externally-influenced input from an upstream component, but it does not neutralize or incorrectly neutralizes special elements that could modify the intended SQL command when it is sent to a downstream component.
CVE-2022-27485 has been classified to as a SQL Injection vulnerability or weakness.
Products Associated with CVE-2022-27485
Want to know whenever a new CVE is published for Fortinet Fortisandbox? stack.watch will email you.
Affected Versions
Fortinet FortiSandbox:- Version 4.2.0 is affected.
- Version 4.0.0, <= 4.0.2 is affected.
- Version 3.2.0, <= 3.2.3 is affected.
- Version 3.1.0, <= 3.1.5 is affected.
- Version 3.0.1, <= 3.0.7 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.