Lack of configuration file validation
Summary
An external control of file name or path vulnerability [CWE-73] in FortiClientMac's installer may allow a local attacker to execute arbitrary code or commands via writing a malicious configuration file in /tmp before starting the installation process.
Version | Affected | Solution |
---|---|---|
FortiClientMac 7.2 | 7.2.0 through 7.2.3 | Upgrade to 7.2.4 or above |
FortiClientMac 7.0 | 7.0.6 through 7.0.10 | Upgrade to 7.0.11 or above |
Acknowledgement
Fortinet is pleased to thank Tomas Kabrt for reporting this vulnerability under responsible disclosure.Timeline
2024-04-09: Initial publication