CVE-2023-42783

A relative path traversal in Fortinet FortiWLM version 8.6.0 through 8.6.5 and 8.5.0 through 8.5.4 and 8.4.2 through 8.4.0 and 8.3.2 through 8.3.0 and 8.2.2 allows attacker to read arbitrary files via crafted http requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-23-143 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiwlm:8.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlm:8.3.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlm:8.3.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlm:8.3.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlm:8.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlm:8.4.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlm:8.4.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiwlm:*:*:*:*:*:*:*:*

Information

Published : 2023-11-14 18:15

Updated : 2023-11-18 03:28


NVD link : CVE-2023-42783

Mitre link : CVE-2023-42783


JSON object : View

Products Affected

fortinet

  • fortiwlm
CWE

No CWE.