First published: Tue Apr 09 2024(Updated: )
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in FortiSandbox may allow an authenticated attacker with at least read-only permission to delete arbitrary files via crafted HTTP requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | >=4.4.0<=4.4.3 | |
Fortinet FortiSandbox Firmware | >=4.2.0<=4.2.6 | |
Fortinet FortiSandbox Firmware | >=4.0.0<=4.0.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-23-454 is moderate due to its potential impact allowing authenticated attackers to delete arbitrary files.
To fix FG-IR-23-454, upgrade FortiSandbox to version 4.4.4 or later, 4.2.7 or later, or 4.0.5 or later depending on the current version.
FG-IR-23-454 is caused by an improper limitation of a pathname allowing path traversal attacks.
Authenticated users with at least read-only permissions on affected versions of FortiSandbox are vulnerable to FG-IR-23-454.
Versions between 4.4.0 and 4.4.3, 4.2.0 and 4.2.6, and 4.0.0 and 4.0.4 of FortiSandbox are vulnerable to FG-IR-23-454.