First published: Tue Dec 07 2021(Updated: )
A relative path traversal [CWE-23] vulnerabiltiy in FortiOS and FortiProxy may allow an unauthenticated, unauthorized attacker to inject path traversal character sequences to disclose sensitive information of the server via the GET request of the login page.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS IPS Engine | ||
Fortinet FortiProxy |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability FG-IR-21-181 has been classified with a high severity due to its ability to allow unauthorized access to sensitive information.
To address FG-IR-21-181, users should update their FortiOS or FortiProxy to the latest patched version provided by Fortinet.
FG-IR-21-181 could potentially expose sensitive server information to an unauthorized attacker if exploited.
Yes, FG-IR-21-181 can be exploited remotely, allowing an unauthenticated attacker to launch an attack via the login page.
FG-IR-21-181 affects Fortinet's FortiOS and FortiProxy products.