First published: Wed Oct 06 2021(Updated: )
A path traversal vulnerability [CWE-22] in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below may allow an authenticated attacker to inject directory traversal character sequences to add/delete the files of the server via the name parameter of Deployment Packages.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet Forticlient Endpoint Management Server | <6.2.9 | |
Fortinet Forticlient Endpoint Management Server | >=6.4.0<6.4.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-15941 is a path traversal vulnerability in FortiClientEMS versions 6.4.1 and below; 6.2.8 and below.
The severity of CVE-2020-15941 is medium with a CVSS score of 5.4.
CVE-2020-15941 may allow an authenticated attacker to inject directory traversal sequences and manipulate files on the server via the name parameter of Deployment Packages.
FortiClientEMS versions 6.4.1 and below, and 6.2.8 and below are affected by CVE-2020-15941.
Update FortiClientEMS to version 6.4.2 or above, or version 6.2.9 or above to mitigate CVE-2020-15941.