First published: Tue Apr 09 2024(Updated: )
An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability |CWE-22] in FortiSandbox may allow an authenticated attacker with at least read-only permission to read arbitrary files via crafted http requests.
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | >=4.4.0<=4.4.4 | |
Fortinet FortiSandbox | >=4.2.0<=4.2.6 | |
Fortinet FortiSandbox | >=4.0 | |
Fortinet FortiSandbox | >=3.2 | |
Fortinet FortiSandbox | >=3.1 | |
Fortinet FortiSandbox | >=3.0 | |
Fortinet FortiSandbox | >=2.5 | |
Fortinet FortiSandbox | >=2.4 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of FG-IR-24-060 is classified as important due to the potential for unauthorized file access.
To fix FG-IR-24-060, upgrade FortiSandbox to version 4.4.5 or later, or to 4.2.7 or later depending on your current version.
FG-IR-24-060 affects all versions of FortiSandbox from 4.4.0 to 4.4.4 and 4.2.0 to 4.2.6, as well as older unsupported versions.
Yes, FG-IR-24-060 can be exploited remotely by an authenticated attacker with read-only permissions.
FG-IR-24-060 is a Path Traversal vulnerability that allows unauthorized file access through crafted HTTP requests.