CVE-2022-42470
11.04.2023, 17:15
A relative path traversal vulnerability in Fortinet FortiClient (Windows) 7.0.0 - 7.0.7, 6.4.0 - 6.4.9, 6.2.0 - 6.2.9 and 6.0.0 - 6.0.10 allows an attacker to execute unauthorized code or commands via sending a crafted request to a specific named pipe.
Vendor | Product | Version |
---|---|---|
fortinet | forticlient | 6.0.0 ≤ 𝑥 ≤ 6.0.10 |
fortinet | forticlient | 6.2.0 ≤ 𝑥 ≤ 6.2.9 |
fortinet | forticlient | 6.4.0 ≤ 𝑥 ≤ 6.4.9 |
fortinet | forticlient | 7.0.0 ≤ 𝑥 < 7.0.8 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-23 - Relative Path TraversalThe software uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.