Path Traversal Vulnerability in FortiClientEMS by Fortinet
CVE-2020-15941
5.4MEDIUM
Summary
A path traversal vulnerability exists in FortiClientEMS versions 6.4.1 and earlier, as well as in 6.2.8 and earlier. This issue allows authenticated attackers to exploit the vulnerability by injecting directory traversal character sequences. By manipulating the name parameter of Deployment Packages, attackers can potentially add or delete files on the server, leading to unauthorized file access and potential system compromise.
Affected Version(s)
Fortinet FortiClientEMS FortiClientEMS 6.4.1, 6.4.0, 6.2.8, 6.2.7, 6.2.6, 6.2.4, 6.2.3, 6.2.2, 6.2.1, 6.2.0
References
CVSS V3.1
Score:
5.4
Severity:
MEDIUM
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved