First published: Tue Oct 10 2023(Updated: )
A relative path traversal [CWE-23] vulnerability in FortiManager and FortiAnalyzer may allow a remote attacker with low privileges to execute unauthorized code via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiManager | >=6.2.0<6.2.12 | |
Fortinet FortiManager | >=6.4.0<6.4.13 | |
Fortinet FortiManager | >=7.0.0<7.0.9 | |
Fortinet FortiManager | >=7.2.0<7.2.4 | |
Fortinet FortiManager | =7.4.0 | |
Fortinet FortiAnalyzer-BigData | >=7.2.0<=7.2.5 | |
Fortinet FortiManager | =. | |
Fortinet FortiManager | >=7.2.0<=7.2.3 | |
Fortinet FortiManager | >=7.0.0<=7.0.8 | |
Fortinet FortiManager | >=6.4.0<=6.4.12 | |
Fortinet FortiManager | >=6.2.0<=6.2.11 |
Please upgrade to FortiAnalyzer-BigData version 7.2.6 or above Please upgrade to FortiAnalyzer-BigData version 7.0.7 or above Please upgrade to FortiAnalyzer-BigData version 6.4.8 or above Please upgrade to FortiAnalyzer-BigData version 6.2.6 or above Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.9 or above Please upgrade to FortiManager version 6.4.13 or above Please upgrade to FortiManager version 6.2.12 or above Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.0.9 or above Please upgrade to FortiAnalyzer version 6.4.13 or above Please upgrade to FortiAnalyzer version 6.2.12 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.