CVE-2023-44256Path Traversal in Fortinet Fortianalyzer

Severity
6.5MEDIUMNVD
EPSS
0.6%
top 31.97%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 20

Description

A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:NExploitability: 2.8 | Impact: 3.6

Affected Packages4 packages

CVEListV5fortinet/fortimanager7.2.07.2.3+2
NVDfortinet/fortimanager7.0.07.0.8+2
CVEListV5fortinet/fortianalyzer7.2.07.2.3+3
NVDfortinet/fortianalyzer6.4.86.4.13+3

🔴Vulnerability Details

1
CVEList
CVE-2023-44256: A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 72023-10-20

📋Vendor Advisories

1
Fortinet
Server side request forgery on fortiview top threats report generation feature.2023-10-20
CVE-2023-44256 — Path Traversal in Fortinet | cvebase