Description
An Authorization Bypass Through User-Controlled Key vulnerability [CWE-639] affecting PortiPortal version 7.2.1 and below, version 7.0.6 and below, version 6.0.14 and below, version 5.3.8 and below may allow a remote authenticated user with at least read-only permissions to access to other organization endpoints via crafted GET requests.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiPortal version 7.2.2 or above Please upgrade to FortiPortal version 7.0.7 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52816 | An Authorization Bypass Through User-Controlled Key vulnerability [CWE-639] affecting PortiPortal version 7.2.1 and below, version 7.0.6 and below, version 6.0.14 and below, version 5.3.8 and below may allow a remote authenticated user with at least read-only permissions to access to other organization endpoints via crafted GET requests. |
References
| Link | Providers |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-408 |
|
History
Tue, 17 Jun 2025 21:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2025-06-17T20:59:15.845Z
Reserved: 2023-11-19T19:58:38.554Z
Link: CVE-2023-48783
Updated: 2024-08-02T21:37:54.975Z
Status : Modified
Published: 2024-01-10T18:15:46.807
Modified: 2024-11-21T08:32:26.210
Link: CVE-2023-48783
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD