CVE-2015-1457

Fortinet FortiAuthenticator 3.0.0 allows local users to read arbitrary files via the -f flag to the dig command.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiauthenticator:3.0.0:*:*:*:*:*:*:*

History

21 Nov 2024, 02:25

Type Values Removed Values Added
References () http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html - Exploit () http://packetstormsecurity.com/files/130156/Fortinet-FortiAuthenticator-XSS-Disclosure-Bypass.html - Exploit
References () http://www.fortiguard.com/advisory/FG-IR-15-003/ - Vendor Advisory () http://www.fortiguard.com/advisory/FG-IR-15-003/ - Vendor Advisory
References () http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf - Exploit () http://www.security-assessment.com/files/documents/advisory/Fortinet_FortiAuthenticator_Multiple_Vulnerabilities.pdf - Exploit
References () http://www.securityfocus.com/bid/72378 - () http://www.securityfocus.com/bid/72378 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/100560 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/100560 -

Information

Published : 2015-02-03 16:59

Updated : 2024-11-21 02:25


NVD link : CVE-2015-1457

Mitre link : CVE-2015-1457

CVE.ORG link : CVE-2015-1457


JSON object : View

Products Affected

fortinet

  • fortiauthenticator
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor