mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-08-04 08:44:25 +00:00
144 lines
6.0 KiB
JSON
144 lines
6.0 KiB
JSON
{
|
|
"data_version": "4.0",
|
|
"data_type": "CVE",
|
|
"data_format": "MITRE",
|
|
"CVE_data_meta": {
|
|
"ID": "CVE-2023-44249",
|
|
"ASSIGNER": "psirt@fortinet.com",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "An authorization bypass through user-controlled key\u00a0[CWE-639] vulnerability in Fortinet FortiManager version 7.4.0 and before 7.2.3 and FortiAnalyzer version 7.4.0 and before 7.2.3 allows a remote attacker with low privileges to read sensitive information via crafted HTTP requests."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Information disclosure",
|
|
"cweId": "CWE-639"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"vendor_name": "Fortinet",
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "FortiManager",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.4.0"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "7.2.0",
|
|
"version_value": "7.2.3"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "7.0.0",
|
|
"version_value": "7.0.9"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.4.0",
|
|
"version_value": "6.4.13"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.2.0",
|
|
"version_value": "6.2.12"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
{
|
|
"product_name": "FortiAnalyzer",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_affected": "=",
|
|
"version_value": "7.4.0"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "7.2.0",
|
|
"version_value": "7.2.3"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "7.0.0",
|
|
"version_value": "7.0.9"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.4.0",
|
|
"version_value": "6.4.13"
|
|
},
|
|
{
|
|
"version_affected": "<=",
|
|
"version_name": "6.2.0",
|
|
"version_value": "6.2.12"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"url": "https://fortiguard.com/psirt/FG-IR-23-201",
|
|
"refsource": "MISC",
|
|
"name": "https://fortiguard.com/psirt/FG-IR-23-201"
|
|
},
|
|
{
|
|
"url": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x8rp-jfwc-gqqj",
|
|
"refsource": "MISC",
|
|
"name": "https://github.com/orangecertcc/security-research/security/advisories/GHSA-x8rp-jfwc-gqqj"
|
|
}
|
|
]
|
|
},
|
|
"solution": [
|
|
{
|
|
"lang": "en",
|
|
"value": "Please upgrade to FortiManager version 7.4.1 or above Please upgrade to FortiManager version 7.2.4 or above Please upgrade to FortiAnalyzer version 7.4.1 or above Please upgrade to FortiAnalyzer version 7.2.4 or above "
|
|
}
|
|
],
|
|
"impact": {
|
|
"cvss": [
|
|
{
|
|
"version": "3.1",
|
|
"attackComplexity": "LOW",
|
|
"attackVector": "NETWORK",
|
|
"availabilityImpact": "NONE",
|
|
"baseScore": 4.1,
|
|
"baseSeverity": "MEDIUM",
|
|
"confidentialityImpact": "LOW",
|
|
"integrityImpact": "NONE",
|
|
"privilegesRequired": "LOW",
|
|
"scope": "UNCHANGED",
|
|
"userInteraction": "NONE",
|
|
"vectorString": "CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:P/RL:X/RC:X"
|
|
}
|
|
]
|
|
}
|
|
} |