CVE-2023-23775

6.5 MEDIUM

📋 TL;DR

This CVE describes SQL injection vulnerabilities in FortiSOAR that allow authenticated attackers to execute unauthorized SQL commands via crafted string parameters. Affected systems include FortiSOAR versions 7.2.0 and earlier than 7.0.3. The vulnerability requires authentication but could lead to data manipulation or unauthorized code execution.

💻 Affected Systems

Products:
  • FortiSOAR
Versions: Versions 7.2.0 and earlier than 7.0.3
Operating Systems: All supported OS for FortiSOAR
Default Config Vulnerable: ⚠️ Yes
Notes: Requires authenticated access to vulnerable endpoints. All default configurations of affected versions are vulnerable.

📦 What is this software?

⚠️ Risk & Real-World Impact

🔴

Worst Case

Authenticated attacker gains full database access, executes arbitrary SQL commands, potentially leading to data exfiltration, system compromise, or lateral movement within the network.

🟠

Likely Case

Authenticated user exploits SQL injection to access or modify sensitive data, escalate privileges, or execute limited commands within database context.

🟢

If Mitigated

With proper input validation and parameterized queries, exploitation attempts are blocked at the application layer with no impact.

🌐 Internet-Facing: MEDIUM
🏢 Internal Only: HIGH

🎯 Exploit Status

Public PoC: ✅ No
Weaponized: UNKNOWN
Unauthenticated Exploit: ✅ No
Complexity: LOW

Exploitation requires authenticated access but SQL injection techniques are well-understood and widely available.

🛠️ Fix & Mitigation

✅ Official Fix

Patch Version: FortiSOAR 7.0.3 and later versions

Vendor Advisory: https://fortiguard.com/psirt/FG-IR-22-448

Restart Required: Yes

Instructions:

1. Backup FortiSOAR configuration and data. 2. Download and install FortiSOAR version 7.0.3 or later from Fortinet support portal. 3. Apply the update following Fortinet's upgrade documentation. 4. Restart FortiSOAR services. 5. Verify functionality post-upgrade.

🔧 Temporary Workarounds

Input Validation Enhancement

all

Implement additional input validation and sanitization for all string parameters in custom workflows and integrations.

Network Segmentation

all

Restrict network access to FortiSOAR management interfaces to authorized users only.

🧯 If You Can't Patch

  • Implement web application firewall (WAF) with SQL injection protection rules
  • Restrict user permissions to minimum required and monitor for suspicious database queries

🔍 How to Verify

Check if Vulnerable:

Check FortiSOAR version via web interface or CLI. If version is 7.2.0 or earlier than 7.0.3, system is vulnerable.

Check Version:

Check via FortiSOAR web interface under System > About, or use FortiSOAR CLI if available.

Verify Fix Applied:

Verify FortiSOAR version is 7.0.3 or later. Test vulnerable endpoints with SQL injection payloads to confirm they are blocked.

📡 Detection & Monitoring

Log Indicators:

  • Unusual SQL queries in database logs
  • Multiple failed authentication attempts followed by SQL-like payloads in application logs
  • Unexpected database schema changes

Network Indicators:

  • SQL keywords in HTTP POST parameters to FortiSOAR endpoints
  • Unusual database connection patterns from FortiSOAR application

SIEM Query:

source="fortisoar" AND ("SELECT" OR "UNION" OR "INSERT" OR "UPDATE" OR "DELETE" OR "DROP" OR "EXEC") IN request_parameters

🔗 References

📤 Share & Export