A relative path traversal in Fortinet FortiManager version 7.4.0 and 7.2.0 through 7.2.3 and 7.0.0 through 7.0.8 and 6.4.0 through 6.4.12 and 6.2.0 through 6.2.11 allows attacker to execute unauthorized code or commands via crafted HTTP requests.
Metrics
Affected Vendors & Products
References
Link | Providers |
---|---|
https://fortiguard.com/psirt/FG-IR-23-189 |
![]() ![]() ![]() |
History
Mon, 16 Dec 2024 22:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Fortinet
Fortinet fortimanager |
|
Weaknesses | CWE-22 | |
CPEs | cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:* |
|
Vendors & Products |
Fortinet
Fortinet fortimanager |

Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T19:30:24.297Z
Reserved: 2023-09-14T08:37:38.657Z
Link: CVE-2023-42791

Updated: 2024-08-02T19:30:24.297Z

Status : Analyzed
Published: 2024-02-20T14:15:08.030
Modified: 2024-12-16T22:23:14.027
Link: CVE-2023-42791

No data.