First published: Tue Jan 14 2025(Updated: )
A improper neutralization of special elements used in an sql command ('sql injection') in Fortinet FortiPortal versions 7.2.4 through 7.2.0 and 7.0.0 through 7.2.8 may allow an authenticated attacker to view the SQL query being run server-side when submitting an HTTP request, via including special elements in said request.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiPortal | >=7.2.0<=7.2.4>=7.0.0<=7.2.8 | |
Fortinet FortiPortal | >=7.0.0<7.0.9 | |
Fortinet FortiPortal | >=7.2.0<7.2.5 |
Please upgrade to FortiPortal version 7.4.0 or above Please upgrade to FortiPortal version 7.2.5 or above Please upgrade to FortiPortal version 7.0.9 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2024-35278 is classified as a medium severity vulnerability due to its potential to allow unauthorized access to sensitive SQL queries.
To fix CVE-2024-35278, upgrade Fortinet FortiPortal to the latest version where the vulnerability has been addressed.
CVE-2024-35278 affects Fortinet FortiPortal versions between 7.2.0 to 7.2.4 and 7.0.0 to 7.2.8.
CVE-2024-35278 can be exploited by authenticated attackers who can submit HTTP requests to the affected FortiPortal application.
CVE-2024-35278 is an SQL injection vulnerability that can allow attackers to view server-side SQL query executions.