8

CVE-2024-23112

An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
FortinetFortiproxy Version >= 7.0.0 <= 7.0.14
FortinetFortiproxy Version >= 7.2.0 <= 7.2.8
FortinetFortiproxy Version >= 7.4.0 <= 7.4.2
FortinetFortios Version >= 6.4.7 <= 6.4.14
FortinetFortios Version >= 7.0.1 <= 7.0.13
FortinetFortios Version >= 7.2.0 <= 7.2.6
FortinetFortios Version >= 7.4.0 <= 7.4.1
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.06% 0.174
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 2.8 1.4
CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N
psirt@fortinet.com 8 1.3 6
CVSS:3.1/AV:A/AC:H/PR:L/UI:N/S:C/C:H/I:H/A:H
CWE-639 Authorization Bypass Through User-Controlled Key

The system's authorization functionality does not prevent one user from gaining access to another user's data or record by modifying the key value identifying the data.