A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-23-143 | Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-23-143 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:23
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.com/psirt/FG-IR-23-143 - Vendor Advisory |
18 Nov 2023, 03:28
Type | Values Removed | Values Added |
---|---|---|
First Time |
Fortinet
Fortinet fortiwlm |
|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 7.5 |
CPE | cpe:2.3:a:fortinet:fortiwlm:8.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlm:8.3.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlm:8.4.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlm:8.4.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlm:8.2.2:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlm:8.3.1:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiwlm:8.3.2:*:*:*:*:*:*:* |
|
References | () https://fortiguard.com/psirt/FG-IR-23-143 - Vendor Advisory |
14 Nov 2023, 18:51
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2023-11-14 18:15
Updated : 2024-11-21 08:23
NVD link : CVE-2023-42783
Mitre link : CVE-2023-42783
CVE.ORG link : CVE-2023-42783
JSON object : View
Products Affected
fortinet
- fortiwlm
CWE
CWE-23
Relative Path Traversal