First published: Fri Oct 13 2023(Updated: )
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 and 4.2.0 through 4.2.5 and 4.0.0 through 4.0.3 and 3.2.0 through 3.2.4 and 2.5.0 through 2.5.2 and 2.4.1 and 2.4.0 allows attacker to denial of service via crafted http requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | >=2.4.0<=2.4.1 | |
Fortinet FortiSandbox | >=2.5.0<=2.5.2 | |
Fortinet FortiSandbox | >=3.2.0<=3.2.4 | |
Fortinet FortiSandbox | >=4.0.0<=4.0.3 | |
Fortinet FortiSandbox | >=4.2.0<=4.2.5 | |
Fortinet FortiSandbox | =4.4.0 |
Please upgrade to FortiSandbox version 4.4.2 or above Please upgrade to FortiSandbox version 4.2.6 or above Please upgrade to FortiSandbox version 4.0.4 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-41682 is a vulnerability in Fortinet FortiSandbox that allows an attacker to perform path traversal and cause denial of service through crafted HTTP requests.
Fortinet FortiSandbox versions 4.4.0, 4.2.0 through 4.2.5, 4.0.0 through 4.0.3, 3.2.0 through 3.2.4, 2.5.0 through 2.5.2, and 2.4.0 through 2.4.1 are affected by CVE-2023-41682.
CVE-2023-41682 has a severity score of 7.5 (High).
An attacker can exploit CVE-2023-41682 by sending crafted HTTP requests that traverse restricted directories, leading to denial of service.
Yes, Fortinet has released patches to address the vulnerability. Please refer to the FortiGuard Advisory FG-IR-23-280 for more information.