Arbitrary read/write vulnerability in administrative interface
Summary
A relative path traversal vulnerability [CWE-23] in FortiOS, FortiProxy, and FortiSwitchManager may allow an authenticated attacker to read and write files on the underlying system via crafted HTTP, HTTPS or CLI requests.
| Version | Affected | Solution |
|---|---|---|
| FortiOS 7.2 | 7.2.0 through 7.2.2 | Upgrade to 7.2.3 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.8 | Upgrade to 7.0.9 or above |
| FortiOS 6.4 | 6.4.0 through 6.4.10 | Upgrade to 6.4.11 or above |
| FortiOS 6.2 | 6.2.0 through 6.2.12 | Upgrade to 6.2.13 or above |
| FortiProxy 7.2 | 7.2.0 through 7.2.1 | Upgrade to 7.2.2 or above |
| FortiProxy 7.0 | 7.0.0 through 7.0.7 | Upgrade to 7.0.8 or above |
| FortiProxy 2.0 | 2.0.0 through 2.0.10 | Upgrade to 2.0.11 or above |
| FortiProxy 1.2 | 1.2 all versions | Migrate to a fixed release |
| FortiProxy 1.1 | 1.1 all versions | Migrate to a fixed release |
| FortiProxy 1.0 | 1.0 all versions | Migrate to a fixed release |
| FortiSwitchManager 7.2 | 7.2.0 | Upgrade to 7.2.1 or above |
| FortiSwitchManager 7.0 | 7.0.0 | Upgrade to 7.0.1 or above |
Acknowledgement
Internally discovered and reported by Théo Leleu of Fortinet Product Security team.
Timeline
2023-02-16: Initial publication