Fortinet FortiManager Path Traversal Vulnerability Allows Unauthorized Code Execution
CVE-2023-42791

8.8HIGH

Key Information:

Vendor
Fortinet
Vendor
CVE Published:
20 February 2024

Badges

📈 Score: 293👾 Exploit Exists🟡 Public PoC

What is CVE-2023-42791?

CVE-2023-42791 is a critical vulnerability affecting Fortinet's FortiManager, a centralized network management solution designed for managing firewalls and other Fortinet security products. This vulnerability arises from a relative path traversal issue, enabling attackers to execute unauthorized commands by sending specially crafted HTTP requests to the affected systems. Such exploitation could lead to severe consequences for organizations, as it allows adversaries to gain control over network management functionalities, potentially leading to unauthorized changes, data breaches, and increased exposure to other threats.

Technical Details

The vulnerability resides within specific versions of Fortinet FortiManager, particularly affecting versions 7.4.0, as well as several earlier versions including 7.2.0 through 7.2.3, 7.0.0 through 7.0.8, 6.4.0 through 6.4.12, and 6.2.0 through 6.2.11. The path traversal flaw enables attackers to manipulate the file path during requests, allowing them to execute arbitrary code or commands on the server. This condition can be exploited remotely without the need for prior authentication, significantly increasing the risk associated with this vulnerability.

Potential Impact of CVE-2023-42791

  1. Unauthorized Code Execution: Attackers can execute arbitrary code on vulnerable systems, leading to immediate loss of control over critical network infrastructure.

  2. Data Breaches and Integrity Violations: The exploitation of this vulnerability could result in sensitive data being compromised or manipulated, harming the integrity and confidentiality of an organization’s information.

  3. Escalation of Further Attacks: Gaining access to FortiManager may enable attackers to pivot within the network, targeting other connected systems and potentially facilitating further exploits or malware deployment, including various forms of cyber extortion.

Affected Version(s)

FortiAnalyzer 7.4.0

FortiAnalyzer 7.2.0 <= 7.2.3

FortiAnalyzer 7.0.0 <= 7.0.8

Exploit Proof of Concept (PoC)

PoC code is written by security researchers to demonstrate the vulnerability can be exploited. PoC code is also a key component for weaponization which could lead to ransomware.

References

CVSS V3.1

Score:
8.8
Severity:
HIGH
Confidentiality:
High
Integrity:
High
Availability:
High
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
None
Scope:
Unchanged

Timeline

  • 🟡

    Public PoC available

  • 👾

    Exploit known to exist

  • Vulnerability published

  • Vulnerability Reserved

.