FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.
References
Link | Resource |
---|---|
http://packetstormsecurity.com/files/161601/FortiLogger-4.4.2.2-Arbitrary-File-Upload.html | Exploit Third Party Advisory VDB Entry |
http://packetstormsecurity.com/files/161974/FortiLogger-Arbitrary-File-Upload.html | Exploit Third Party Advisory VDB Entry |
https://github.com/erberkan/fortilogger_arbitrary_fileupload | Exploit Third Party Advisory |
Configurations
History
No history.
Information
Published : 2021-02-01 23:15
Updated : 2024-02-28 18:08
NVD link : CVE-2021-3378
Mitre link : CVE-2021-3378
CVE.ORG link : CVE-2021-3378
JSON object : View
Products Affected
fortilogger
- fortilogger
CWE
CWE-434
Unrestricted Upload of File with Dangerous Type