First published: Mon Jun 03 2024(Updated: )
A client-side enforcement of server-side security in Fortinet FortiPortal version 6.0.0 through 6.0.14 allows attacker to improper access control via crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiPortal | >=6.0.0<6.0.15 |
Please upgrade to FortiPortal version 6.0.15 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-48789 is classified as a high severity vulnerability that allows improper access control.
To resolve CVE-2023-48789, you should upgrade Fortinet FortiPortal to version 6.0.15 or later.
CVE-2023-48789 affects Fortinet FortiPortal versions from 6.0.0 to 6.0.14.
CVE-2023-48789 allows attackers to perform unauthorized access through crafted HTTP requests.
CVE-2023-48789 is a client-side enforcement issue of server-side security.