cve/2019/CVE-2019-15711.md

18 lines
761 B
Markdown
Raw Normal View History

2024-05-26 14:27:05 +02:00
### [CVE-2019-15711](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2019-15711)
![](https://img.shields.io/static/v1?label=Product&message=Fortinet%20FortiClientLinux&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Escalation%20of%20privilege&color=brighgreen)
### Description
A privilege escalation vulnerability in FortiClient for Linux 6.2.1 and below may allow an user with low privilege to run system commands under root privilege via injecting specially crafted "ExportLogs" type IPC client requests to the fctsched process.
### POC
#### Reference
- https://fortiguard.com/psirt/FG-IR-19-238
#### Github
No PoCs found on GitHub currently.