{"vulnerability": "CVE-2021-22123", "sightings": [{"uuid": "c7678b79-73ae-4bda-b1d0-f941c28794f8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22123", "type": "seen", "source": "MISP/f3c2a638-46ae-4fda-91c3-d770c162d6bd", "content": "", "creation_timestamp": "2024-11-14T06:09:41.000000Z"}, {"uuid": "a530d89e-b934-4a0d-ac11-fe232982b3dd", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22123", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/338", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01\n\n\u66f4\u65b0\u4e86\uff1aCVE-2021\n\u63cf\u8ff0\uff1a[CVE-2021-22123] Fortinet FortiWeb Authenticated OS Command Injection\nURL\uff1ahttps://github.com/murataydemir/CVE-2021-22123", "creation_timestamp": "2021-08-18T13:24:23.000000Z"}, {"uuid": "3cda8d11-7e23-4c90-9c29-2d278fc84dac", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22123", "type": "seen", "source": "https://t.me/CyberSecurityTechnologies/4093", "content": "#Threat_Research\n1. ThroughTek \"Kalay\" Protocol Vulnerability (CVE-2021-28372)\nhttps://www.fireeye.com/blog/threat-research/2021/08/mandiant-discloses-critical-vulnerability-affecting-iot-devices.html\n2. Fortinet FortiWeb Vulnerability (CVE-2021-22123)\nhttps://www.rapid7.com/blog/post/2021/08/17/fortinet-fortiweb-os-command-injection", "creation_timestamp": "2021-08-18T12:43:39.000000Z"}, {"uuid": "a355f58c-6075-4cdb-98eb-9f8b5d4f4f1e", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22123", "type": "seen", "source": "https://t.me/ptswarm/43", "content": "Fortinet fixed a Post-Auth RCE in FortiWeb (CVE-2021-22123) found by our researcher Andrey Medov.\n\nThis vulnerability was part of an Unauth RCE chain submitted together with CVE-2020-29015 (Unauth SQL Injection), which was fixed by Fortinet earlier.\n\nAdvisory: https://www.fortiguard.com/psirt/FG-IR-20-120\n\nSubscribe to the PT SWARM Twitter to get updates about all of the latest vulnerabilities discovered by us.", "creation_timestamp": "2021-06-02T06:43:38.000000Z"}, {"uuid": "ea72aea7-eb20-4d48-b41f-dbc24aad802f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2021-22123", "type": "seen", "source": "https://t.me/thehackernews/1448", "content": "Rapid7 discloses a new UNPATCHED vulnerability (CVE-2021-22123) in Fortinet's Fortiweb Web Application Firewall (WAF) appliances that could be exploited by a remote, authenticated attacker to execute malicious commands on the system.\n\nRead: https://thehackernews.com/2021/08/unpatched-remote-hacking-zero-day-flaw.html", "creation_timestamp": "2021-08-18T05:43:36.000000Z"}]}