FortiDAST
FortiDAST performs automated black-box dynamic application security testing of web applications to identify vulnerabilities that bad actors may exploit.
rdiwakar
Staff
Staff
Article Id 320915
Description

CVE-2022-4257 is a critical vulnerability that affects C-DATA Web Management System. This issue affects some unknown processing of the file cgi-bin/jumpto.php of the component GET Parameter Handler. The manipulation of the argument hostname leads to argument injection. It allows remote attackers to execute arbitrary commands on the target system, potentially giving them complete control over it.

 

This article describes the assessment of Remote Code Execution vulnerability in C-Data Web Management software.

Scope FortiDAST Scripting Engine updated in version 24.1.0-build012(GA)
Solution

Detection against that vulnerability is empowered by the FortiDAST Scripting Engine (FSE).

This technology enables FortiDAST to assess remotely with a high level of confidence if an asset is vulnerable to a specific vulnerability by testing the disarmed exploit against the asset itself.

 

To configure the scan, it will be necessary to enable the FSE group signature 'cdata' which will select the underlying script: ‘CVE-2022-4257-CData-Web-Management-RCE-Vulnerability.’

 

For reference, a step-by-step guide on how to configure FortiDAST to trigger FSE can be found on Fortinet’s blog:
https://www.fortinet.com/blog/business-and-technology/fortipentest-exploit-engine-a-new-security-ars...

Contributors