First published: Tue Nov 14 2023(Updated: )
A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWLM | >=8.5.0<=8.5.4 | |
Fortinet FortiWLM | >=8.6.0<=8.6.6 | |
Fortinet FortiWLM | =8.2.2 | |
Fortinet FortiWLM | =8.3.0 | |
Fortinet FortiWLM | =8.3.1 | |
Fortinet FortiWLM | =8.3.2 | |
Fortinet FortiWLM | =8.4.0 | |
Fortinet FortiWLM | =8.4.1 | |
Fortinet FortiWLM | =8.4.2 |
Please upgrade to FortiWLM version 8.6.6 or above Please upgrade to FortiWLM version 8.5.5 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-42783.
The severity of CVE-2023-42783 is high with a CVSS score of 7.3.
Fortinet FortiWLM versions 8.6.0 through 8.6.5, 8.5.0 through 8.5.4, 8.4.2 through 8.4.0, 8.3.2 through 8.3.0, and 8.2.2 are affected by CVE-2023-42783.
CVE-2023-42783 allows an attacker to read arbitrary files through crafted HTTP requests with a relative path traversal vulnerability.
You can find more information about CVE-2023-42783 at the following URL: https://fortiguard.com/psirt/FG-IR-23-143.