Vulnerability Description
An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.
CVSS Score
CRITICAL
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortiproxy | < 1.2.9 |
| Fortinet | Fortios | >= 5.4.6, < 5.4.13 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/advisory/FG-IR-18-384MitigationVendor Advisory
- https://www.fortiguard.com/psirt/FG-IR-20-233Vendor Advisory
- https://fortiguard.com/advisory/FG-IR-18-384MitigationVendor Advisory
- https://www.fortiguard.com/psirt/FG-IR-20-233Vendor Advisory
- https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-US Government Resource
FAQ
What is CVE-2018-13379?
CVE-2018-13379 is a vulnerability with a CVSS score of 9.1 (CRITICAL). An Improper Limitation of a Pathname to a Restricted Directory ("Path Traversal") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to ...
How severe is CVE-2018-13379?
CVE-2018-13379 has been rated CRITICAL with a CVSS base score of 9.1/10. This is considered a critical vulnerability requiring immediate attention.
Is there a patch for CVE-2018-13379?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortiproxy, Fortinet Fortios.