Fortinet FortiAnalyzer/Manager SSRF (CVE-2023-44256, v7.2v7.4)
CVE-2023-44256 Published on October 20, 2023

A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request.

NVD

Vulnerability Analysis

Attack Vector:
ADJACENT_NETWORK
Attack Complexity:
LOW
Privileges Required:
NONE
User Interaction:
NONE
Scope:
UNCHANGED
Confidentiality Impact:
HIGH
Integrity Impact:
NONE
Availability Impact:
NONE

Weakness Type

What is a Directory traversal Vulnerability?

The software uses external input to construct a pathname that is intended to identify a file or directory that is located underneath a restricted parent directory, but the software does not properly neutralize special elements within the pathname that can cause the pathname to resolve to a location that is outside of the restricted directory.

CVE-2023-44256 has been classified to as a Directory traversal vulnerability or weakness.


Products Associated with CVE-2023-44256

stack.watch emails you whenever new vulnerabilities are published in Fortinet Fortianalyzer or Fortinet FortiManager. Just hit a watch button to start following.

 
 

Affected Versions

Fortinet FortiAnalyzer: Fortinet FortiManager: fortinet fortianalyzer: fortinet fortimanager:

Exploit Probability

EPSS
0.55%
Percentile
67.74%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.