First published: Tue Jun 04 2019(Updated: )
A path traversal vulnerability in the FortiProxy SSL VPN web portal may allow a non-authenticated, remote attacker to download FortiProxy system files through specially crafted HTTP resource requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiOS IPS Engine | >=5.6.3<=5.6.7 | |
Fortinet FortiOS IPS Engine | >=6.0.0<=6.0.4 | |
Fortinet FortiProxy | <1.2.9 | |
Fortinet FortiProxy | =2.0.0 | |
Fortinet FortiOS IPS Engine | >=5.4.6<5.4.13 | |
Fortinet FortiOS IPS Engine | >=5.6.3<5.6.8 | |
Fortinet FortiOS IPS Engine | >=6.0.0<6.0.5 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
(Found alongside the following vulnerabilities)
CVE-2018-13379 has a high severity rating due to its potential to allow remote attackers to access sensitive system files.
To fix CVE-2018-13379, update FortiOS or FortiProxy to the latest version provided by Fortinet.
CVE-2018-13379 affects FortiOS versions from 5.4.6 to 5.6.8 and FortiProxy versions prior to 1.2.9.
Yes, CVE-2018-13379 can be exploited remotely by non-authenticated attackers.
CVE-2018-13379 is classified as a path traversal vulnerability.