Description
A client-side enforcement of server-side security in Fortinet FortiPortal version 6.0.0 through 6.0.14 allows attacker to improper access control via crafted HTTP requests.
No analysis available yet.
Remediation
Vendor Solution
Please upgrade to FortiPortal version 6.0.15 or above
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
EUVD |
EUVD-2023-52822 | A client-side enforcement of server-side security in Fortinet FortiPortal version 6.0.0 through 6.0.14 allows attacker to improper access control via crafted HTTP requests. |
References
| Link | Providers |
|---|---|
| https://fortiguard.fortinet.com/psirt/FG-IR-23-406 |
|
History
Sat, 12 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Thu, 02 Jan 2025 19:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| First Time appeared |
Fortinet
Fortinet fortiportal |
|
| Weaknesses | NVD-CWE-Other | |
| CPEs | cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:* | |
| Vendors & Products |
Fortinet
Fortinet fortiportal |
Status: PUBLISHED
Assigner: fortinet
Published:
Updated: 2024-08-02T21:37:55.014Z
Reserved: 2023-11-19T19:58:38.554Z
Link: CVE-2023-48789
Updated: 2024-08-02T21:37:55.014Z
Status : Analyzed
Published: 2024-06-03T08:15:08.507
Modified: 2025-01-02T18:33:37.333
Link: CVE-2023-48789
No data.
OpenCVE Enrichment
No data.
Weaknesses
EUVD