7.5

CVE-2023-42783

A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FortinetFortiwlm Version >= 8.5.0 <= 8.5.4
FortinetFortiwlm Version >= 8.6.0 <= 8.6.6
FortinetFortiwlm Version8.2.2
FortinetFortiwlm Version8.3.0
FortinetFortiwlm Version8.3.1
FortinetFortiwlm Version8.3.2
FortinetFortiwlm Version8.4.0
FortinetFortiwlm Version8.4.1
FortinetFortiwlm Version8.4.2
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.86% 0.742
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
psirt@fortinet.com 7.5 3.9 3.6
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
CWE-23 Relative Path Traversal

The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory.