CVE-2024-31491

CWE-6024 documents4 sources
Severity
8.8HIGH
EPSS
1.1%
top 21.64%
CISA KEV
Not in KEV
Exploit
No known exploits
Affected products
Timeline
PublishedMay 14

Description

A client-side enforcement of server-side security vulnerability in Fortinet FortiSandbox 4.4.0 through 4.4.4, FortiSandbox 4.2.1 through 4.2.6 allows attacker to execute unauthorized code or commands via HTTP requests.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:HExploitability: 2.8 | Impact: 5.9

Affected Packages2 packages

NVDfortinet/fortisandbox4.2.04.2.7+1
CVEListV5fortinet/fortisandbox4.4.04.4.4+1

🔴Vulnerability Details

2
GHSA
GHSA-c9v5-8cvh-f6v3: A client-side enforcement of server-side security in Fortinet FortiSandbox version 42024-05-14
CVEList
CVE-2024-31491: A client-side enforcement of server-side security vulnerability in Fortinet FortiSandbox 42024-05-14

📋Vendor Advisories

1
Fortinet
Readonly user could execute sensitive operations2024-05-14
CVE-2024-31491 (HIGH CVSS 8.8) | A client-side enforcement of server | cvebase.io