cve/2019/CVE-2019-15711.md

19 lines
806 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-15711](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15711)
![](https://img.shields.io/static/v1?label=Product&message=Fortinet%20FortiClientLinux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Escalation%20of%20privilege&color=brighgreen)
### Description
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
### POC
#### Reference
- https://fortiguard.com/psirt/FG-IR-19-238
2024-06-09 00:33:16 +00:00
- https://fortiguard.com/psirt/FG-IR-19-238
2024-05-26 14:27:05 +02:00
#### Github
No PoCs found on GitHub currently.