CVE-2023-44256
20.10.2023, 10:15
A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request.
Vendor | Product | Version |
---|---|---|
fortinet | fortianalyzer | 6.4.8 ≤ 𝑥 ≤ 6.4.13 |
fortinet | fortianalyzer | 7.0.2 ≤ 𝑥 ≤ 7.0.8 |
fortinet | fortianalyzer | 7.2.0 ≤ 𝑥 ≤ 7.2.3 |
fortinet | fortianalyzer | 7.4.0 |
fortinet | fortimanager | 7.0.0 ≤ 𝑥 ≤ 7.0.8 |
fortinet | fortimanager | 7.2.0 ≤ 𝑥 ≤ 7.2.3 |
fortinet | fortimanager | 7.4.0 |
𝑥
= Vulnerable software versions
Common Weakness Enumeration
- CWE-22 - Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
- CWE-918 - Server-Side Request Forgery (SSRF)The web server receives a URL or similar request from an upstream component and retrieves the contents of this URL, but it does not sufficiently ensure that the request is being sent to the expected destination.