Vulnerability Description
A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortianalyzer | >= 6.4.8, <= 6.4.13 |
| Fortinet | Fortimanager | >= 7.0.0, <= 7.0.8 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/psirt/FG-IR-19-039Vendor Advisory
- https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-ExploitThird Party Advisory
- https://fortiguard.com/psirt/FG-IR-19-039Vendor Advisory
- https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-ExploitThird Party Advisory
FAQ
What is CVE-2023-44256?
CVE-2023-44256 is a vulnerability with a CVSS score of 6.5 (MEDIUM). A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 ...
How severe is CVE-2023-44256?
CVE-2023-44256 has been rated MEDIUM with a CVSS base score of 6.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-44256?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortianalyzer, Fortinet Fortimanager.