Path traversal in csfd daemon
Summary
An improper limitation of a pathname to a restricted directory vulnerability ('path traversal') [CWE-22] in FortiManager, FortiOS, FortiProxy, FortiRecorder, FortiVoice and FortiWeb may allow a remote authenticated attacker with access to the security fabric interface and port to write arbitrary files and a remote unauthenticated attacker with the same network access to delete an arbitrary folder.
| Version | Affected | Solution |
|---|---|---|
| FortiManager 7.6 | 7.6.0 through 7.6.1 | Upgrade to 7.6.2 or above |
| FortiManager 7.4 | 7.4.1 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiManager 7.2 | Not affected | Not Applicable |
| FortiManager 7.0 | Not affected | Not Applicable |
| FortiManager 6.4 | Not affected | Not Applicable |
| FortiManager Cloud 7.4 | 7.4.1 through 7.4.3 | Upgrade to 7.4.4 or above |
| FortiOS 7.6 | 7.6.0 | Upgrade to 7.6.1 or above |
| FortiOS 7.4 | 7.4.0 through 7.4.4 | Upgrade to 7.4.5 or above |
| FortiOS 7.2 | 7.2.0 through 7.2.9 | Upgrade to 7.2.10 or above |
| FortiOS 7.0 | 7.0.0 through 7.0.15 | Upgrade to 7.0.16 or above |
| FortiOS 6.4 | 6.4.0 through 6.4.15 | Upgrade to 6.4.16 or above |
| FortiProxy 7.6 | Not affected | Not Applicable |
| FortiProxy 7.4 | 7.4.0 through 7.4.5 | Upgrade to 7.4.6 or above |
| FortiProxy 7.2 | 7.2.0 through 7.2.11 | Upgrade to 7.2.12 or above |
| FortiProxy 7.0 | 7.0.0 through 7.0.18 | Upgrade to 7.0.19 or above |
| FortiProxy 2.0 | 2.0 all versions | Migrate to a fixed release |
| FortiProxy 1.2 | 1.2 all versions | Migrate to a fixed release |
| FortiProxy 1.1 | 1.1 all versions | Migrate to a fixed release |
| FortiProxy 1.0 | 1.0 all versions | Migrate to a fixed release |
| FortiRecorder 7.2 | 7.2.0 through 7.2.1 | Upgrade to 7.2.2 or above |
| FortiRecorder 7.0 | 7.0.0 through 7.0.4 | Upgrade to 7.0.5 or above |
| FortiRecorder 6.4 | Not affected | Not Applicable |
| FortiVoice 7.2 | Not affected | Not Applicable |
| FortiVoice 7.0 | 7.0.0 through 7.0.4 | Upgrade to 7.0.5 or above |
| FortiVoice 6.4 | 6.4.0 through 6.4.9 | Upgrade to 6.4.10 or above |
| FortiVoice 6.0 | 6.0 all versions | Migrate to a fixed release |
| FortiWeb 7.6 | 7.6.0 | Upgrade to 7.6.1 or above |
| FortiWeb 7.4 | 7.4.0 through 7.4.4 | Upgrade to 7.4.5 or above |
| FortiWeb 7.2 | 7.2 all versions | Migrate to a fixed release |
| FortiWeb 7.0 | 7.0 all versions | Migrate to a fixed release |
| FortiWeb 6.4 | 6.4 all versions | Migrate to a fixed release |
Fortinet in Q4/24 has remediated this issue in FortiSASE version 24.3.c and hence the customers need not perform any action.
Workarround :
disable the security fabric :
config system csf
set status disable
end
or
remove fabric from config system interface:
config system interface
edit "portX"
set allow access ssh https
next
end
Acknowledgement
Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security Team.Timeline
2025-01-14: Initial publication2025-01-16: add workarounds
2025-03-20: added FortiOS 6.4.16 in fixed versions