cve/2023/CVE-2023-44251.md

18 lines
862 B
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-44251](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-44251)
![](https://img.shields.io/static/v1?label=Product&message=FortiWAN&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=5.2.0%3C%3D%205.2.1%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Execute%20unauthorized%20code%20or%20commands&color=brighgreen)
### Description
** UNSUPPORTED WHEN ASSIGNED **A improper limitation of a pathname to a restricted directory ('path traversal') vulnerability [CWE-22] in Fortinet FortiWAN version 5.2.0 through 5.2.1 and version 5.1.1. through 5.1.2 may allow an authenticated attacker to read and delete arbitrary file of the system via crafted HTTP or HTTPs requests.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/fkie-cad/nvd-json-data-feeds