Description
A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request.
Published: 2023-10-20
Score: 6.4 Medium
EPSS: < 1% Very Low
KEV: No
Impact: n/a
Action: n/a
AI Analysis

No analysis available yet.

Remediation

Vendor Solution

Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.0.9 or above Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiManager version 7.0.9 or above

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
EUVD EUVD EUVD-2023-48615 A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request.
History

No history.

Subscriptions

Fortinet Fortianalyzer Fortimanager
cve-icon MITRE

Status: PUBLISHED

Assigner: fortinet

Published:

Updated: 2024-09-12T14:30:39.261Z

Reserved: 2023-09-27T12:26:48.751Z

Link: CVE-2023-44256

cve-icon Vulnrichment

Updated: 2024-08-02T19:59:51.976Z

cve-icon NVD

Status : Modified

Published: 2023-10-20T10:15:12.870

Modified: 2024-11-21T08:25:31.910

Link: CVE-2023-44256

cve-icon Redhat

No data.

cve-icon OpenCVE Enrichment

No data.

Weaknesses