Fortinet FortiAnalyzer/Manager SSRF (CVE-2023-44256, v7.2v7.4)
CVE-2023-44256 Published on October 20, 2023
A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request.
Vulnerability Analysis
Weakness Type
What is a Directory traversal Vulnerability?
The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.
CVE-2023-44256 has been classified to as a Directory traversal vulnerability or weakness.
Products Associated with CVE-2023-44256
stack.watch emails you whenever new vulnerabilities are published in Fortinet Fortianalyzer or Fortinet FortiManager. Just hit a watch button to start following.
Affected Versions
Fortinet FortiAnalyzer:- Version 7.4.0 is affected.
- Version 7.2.0, <= 7.2.3 is affected.
- Version 7.0.2, <= 7.0.8 is affected.
- Version 6.4.8, <= 6.4.13 is affected.
- Version 7.4.0 is affected.
- Version 7.2.0, <= 7.2.3 is affected.
- Version 7.0.0, <= 7.0.8 is affected.
- Version 7.4.0 is affected.
- Version 7.2.0, <= 7.2.3 is affected.
- Version 7.0.2, <= 7.0.8 is affected.
- Version 6.4.8, <= 6.4.13 is affected.
- Version 7.4.0 is affected.
- Version 7.2.0, <= 7.2.3 is affected.
- Version 7.0.0, <= 7.0.8 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.