First published: Thu Feb 16 2023(Updated: )
A relative path traversal in Fortinet FortiWeb version 7.0.0 through 7.0.2, FortiWeb version 6.3.6 through 6.3.20, FortiWeb 6.4 all versions allows attacker to information disclosure via specially crafted web requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.3.6<6.3.21 | |
Fortinet FortiWeb | >=6.4.0<=6.4.2 | |
Fortinet FortiWeb | >=7.0.0<7.0.3 |
Please upgrade to FortiWeb version 7.0.3 or above Please upgrade to FortiWeb version 6.3.21 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Fortinet FortiWeb vulnerability is CVE-2023-23784.
The affected software for this vulnerability is Fortinet FortiWeb versions 7.0.0 through 7.0.2, FortiWeb versions 6.3.6 through 6.3.20, and FortiWeb 6.4 all versions.
An attacker can exploit this vulnerability by using specially crafted web requests to perform relative path traversal and gain access to sensitive information.
The severity of this vulnerability is medium, with a CVSS score of 6.5.
Yes, Fortinet has released patches to address this vulnerability. It is recommended to update to the latest version of FortiWeb to mitigate the risk.