Description
An unauthorized configuration download vulnerability in FortiWeb 6.3.6 through 6.3.21, 6.4.0 through 6.4.2 and 7.0.0 through 7.0.4 may allow a local attacker to access confidential configuration files via a crafted http request.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiWeb version 7.0.5 or above. Please upgrade to FortiWeb version 7.2.0 or above.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-26770 | An unauthorized configuration download vulnerability in FortiWeb 6.3.6 through 6.3.21, 6.4.0 through 6.4.2 and 7.0.0 through 7.0.4 may allow a local attacker to access confidential configuration files via a crafted http request. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-22-460 |
|
History
Wed, 23 Oct 2024 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-10-23T14:32:01.030Z
Reserved: 2023-01-05T10:06:31.521Z
Link: CVE-2023-22636
Updated: 2024-08-02T10:13:49.450Z
Status : Modified
Published: 2023-02-27T09:15:09.267
Modified: 2024-11-21T07:45:05.953
Link: CVE-2023-22636
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD