CVE-2022-33876

Multiple instances of improper input validation vulnerability in Fortinet FortiADC version 7.1.0, version 7.0.0 through 7.0.2 and version 6.2.4 and below allows an authenticated attacker to retrieve files with specific extension from the underlying Linux system via crafted HTTP requests.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*

History

21 Nov 2024, 07:08

Type Values Removed Values Added
References () https://fortiguard.com/psirt/FG-IR-22-253 - Vendor Advisory () https://fortiguard.com/psirt/FG-IR-22-253 - Vendor Advisory
CVSS v2 : unknown
v3 : 6.5
v2 : unknown
v3 : 5.4

08 Aug 2023, 14:21

Type Values Removed Values Added
CWE CWE-444 CWE-20

Information

Published : 2022-12-06 17:15

Updated : 2024-11-21 07:08


NVD link : CVE-2022-33876

Mitre link : CVE-2022-33876

CVE.ORG link : CVE-2022-33876


JSON object : View

Products Affected

fortinet

  • fortiadc
CWE
CWE-20

Improper Input Validation