First published: Tue Sep 10 2024(Updated: )
An exposure of sensitive Information to an unauthorized actor vulnerability [CWE-200] in FortiSandbox may allow an authenticated attacker with at least read-only permission to read sensitive files via HTTP get requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox Firmware | >=4.4.0<=4.4.4 | |
Fortinet FortiSandbox Firmware | >=4.2.0<=4.2.6 | |
Fortinet FortiSandbox Firmware | >=4.0 | |
Fortinet FortiSandbox Firmware | >=3.2.2<=3.2.4 | |
Fortinet FortiSandbox Firmware | =. |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-051 is significant due to the potential for authenticated attackers to access sensitive information.
To fix FG-IR-24-051, upgrade FortiSandbox to version 4.4.5 or later, or 4.2.7 or later, depending on your current version.
Users of Fortinet FortiSandbox versions between 4.0 and 4.4.4, as well as certain versions of 4.2.x and 3.2.x are affected by FG-IR-24-051.
FG-IR-24-051 exposes sensitive files that can be accessed by authenticated users with read-only permissions.
The nature of the vulnerability in FG-IR-24-051 is classified as an exposure of sensitive information to unauthorized actors via HTTP GET requests.