cvelist/2020/9xxx/CVE-2020-9290.json

62 lines
2.0 KiB
JSON
Raw Normal View History

2020-02-19 20:01:16 +00:00
{
"data_type": "CVE",
"data_format": "MITRE",
"data_version": "4.0",
"CVE_data_meta": {
"ID": "CVE-2020-9290",
2020-03-15 22:01:14 +00:00
"ASSIGNER": "psirt@fortinet.com",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"vendor_name": "Fortinet",
"product": {
"product_data": [
{
"product_name": "Fortinet FortiClient for Windows",
"version": {
"version_data": [
{
"version_value": "6.2.3 and below"
}
]
}
}
]
}
}
]
}
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Execute unauthorized code or commands"
}
]
}
]
},
"references": {
"reference_data": [
{
"refsource": "CONFIRM",
"name": "https://fortiguard.com/psirt/FG-IR-19-060",
"url": "https://fortiguard.com/psirt/FG-IR-19-060"
}
]
2020-02-19 20:01:16 +00:00
},
"description": {
"description_data": [
{
"lang": "eng",
2020-03-15 22:01:14 +00:00
"value": "An Unsafe Search Path vulnerability in FortiClient for Windows online installer 6.2.3 and below may allow a local attacker with control over the directory in which FortiClientOnlineInstaller.exe and FortiClientVPNOnlineInstaller.exe resides to execute arbitrary code on the system via uploading malicious Filter Library DLL files in that directory."
2020-02-19 20:01:16 +00:00
}
]
}
}