### [CVE-2024-23112](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2024-23112) ![](https://img.shields.io/static/v1?label=Product&message=FortiOS&color=blue) ![](https://img.shields.io/static/v1?label=Product&message=FortiProxy&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=7.4.0%3C%3D%207.4.1%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Version&message=7.4.0%3C%3D%207.4.2%20&color=brighgreen) ![](https://img.shields.io/static/v1?label=Vulnerability&message=Improper%20access%20control&color=brighgreen) ### Description An authorization bypass through user-controlled key vulnerability [CWE-639] in FortiOS version 7.4.0 through 7.4.1, 7.2.0 through 7.2.6, 7.0.1 through 7.0.13, 6.4.7 through 6.4.14, and FortiProxy version 7.4.0 through 7.4.2, 7.2.0 through 7.2.8, 7.0.0 through 7.0.14 SSL-VPN may allow an authenticated attacker to gain access to another user’s bookmark via URL manipulation. ### POC #### Reference No PoCs from references. #### Github - https://github.com/fkie-cad/nvd-json-data-feeds