First published: Tue Dec 06 2022(Updated: )
Multiple instances of improper input validation vulnerability in Fortinet FortiADC version 7.1.0, version 7.0.0 through 7.0.2 and version 6.2.4 and below allows an authenticated attacker to retrieve files with specific extension from the underlying Linux system via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiADC | >=5.1.0<=6.2.4 | |
Fortinet FortiADC | =7.0.0 | |
Fortinet FortiADC | =7.0.1 | |
Fortinet FortiADC | =7.0.2 | |
Fortinet FortiADC | =7.1.0 |
Please upgrade to FortiADC version 7.1.1 or above Please upgrade to FortiADC version 7.0.3 or above Please upgrade to FortiADC version 6.2.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2022-33876 is a vulnerability in Fortinet FortiADC version 7.1.0 and below that allows an authenticated attacker to retrieve files with specific extensions from the underlying Linux system through crafted HTTP requests.
Fortinet FortiADC versions 7.1.0, 7.0.0 through 7.0.2, and 6.2.4 and below are affected by CVE-2022-33876.
CVE-2022-33876 has a severity score of 6.5 (medium).
An authenticated attacker can exploit CVE-2022-33876 by sending crafted HTTP requests to retrieve files with specific extensions from the underlying Linux system.
Yes, you can find more information about CVE-2022-33876 at the following reference: https://fortiguard.com/psirt/FG-IR-22-253