First published: Tue Jun 11 2024(Updated: )
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiPortal versions 7.0.0 through 7.0.6 and version 7.2.0 allows privileged user to obtain unauthorized information via the report download functionality.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiPortal | >=7.0.0<7.0.7 | |
Fortinet FortiPortal | =7.2.0 |
Please upgrade to FortiPortal version 7.2.1 or above Please upgrade to FortiPortal version 7.0.7 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-31495 is classified as a high-severity vulnerability due to its potential for unauthorized information access.
To mitigate CVE-2024-31495, upgrade Fortinet FortiPortal to version 7.0.7 or later, or version 7.2.1 or later.
CVE-2024-31495 affects users of Fortinet FortiPortal versions 7.0.0 through 7.0.6 and version 7.2.0.
CVE-2024-31495 is an SQL injection vulnerability that allows privileged users to exploit the report download feature.
Attackers exploiting CVE-2024-31495 can obtain unauthorized information through the FortiPortal report download functionality.