First published: Tue Apr 09 2024(Updated: )
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in FortiSandbox may allow a privileged attacker with super-admin profile and CLI access to execute arbitrary code via CLI.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | >=4.4.0<=4.4.2 | |
Fortinet FortiSandbox | >=4.2.0<=4.2.6 | |
Fortinet FortiSandbox | >=4.0 | |
Fortinet FortiSandbox | >=3.2 | |
Fortinet FortiSandbox | >=3.1 | |
Fortinet FortiSandbox | >=3.0 | |
Fortinet FortiSandbox | >=2.5 | |
Fortinet FortiSandbox | >=2.4 | |
Fortinet FortiSandbox | >=2.3 | |
Fortinet FortiSandbox | >=2.2 | |
Fortinet FortiSandbox | >=2.1 | |
Fortinet FortiSandbox | >=2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The FG-IR-23-416 vulnerability is classified as high severity due to its potential for arbitrary code execution by a privileged attacker.
To remediate FG-IR-23-416, upgrade FortiSandbox to version 4.4.3 or higher, or to version 4.2.7 or higher.
FG-IR-23-416 affects FortiSandbox versions 4.4.0 to 4.4.2 and 4.2.0 to 4.2.6, among other earlier versions.
FG-IR-23-416 is a path traversal vulnerability that allows unauthorized access to system files.
FG-IR-23-416 can be exploited by an attacker with a super-admin profile and CLI access.