A relative path traversal vulnerability [CWE-23] in Fortinet FortiOS version 7.2.0 through 7.2.2, 7.0.0 through 7.0.8 and before 6.4.10, FortiProxy version 7.2.0 through 7.2.1, 7.0.0 through 7.0.7 and before 2.0.10, FortiSwitchManager 7.2.0 and before 7.0.0 allows an authenticated attacker to read and write files on the underlying Linux system via crafted HTTP requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-391 | Patch Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-22-391 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 07:23
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 8.8 |
References | () https://fortiguard.com/psirt/FG-IR-22-391 - Patch, Vendor Advisory |
07 Nov 2023, 03:52
Type | Values Removed | Values Added |
---|---|---|
Summary | A relative path traversal vulnerability [CWE-23] in Fortinet FortiOS version 7.2.0 through 7.2.2, 7.0.0 through 7.0.8 and before 6.4.10, FortiProxy version 7.2.0 through 7.2.1, 7.0.0 through 7.0.7 and before 2.0.10, FortiSwitchManager 7.2.0 and before 7.0.0 allows an authenticated attacker to read and write files on the underlying Linux system via crafted HTTP requests. |
Information
Published : 2023-02-16 19:15
Updated : 2024-11-21 07:23
NVD link : CVE-2022-41335
Mitre link : CVE-2022-41335
CVE.ORG link : CVE-2022-41335
JSON object : View
Products Affected
fortinet
- fortiproxy
- fortios
- fortiswitchmanager