Vulnerability Description
An Authorization Bypass Through User-Controlled Key vulnerability [CWE-639] affecting PortiPortal version 7.2.1 and below, version 7.0.6 and below, version 6.0.14 and below, version 5.3.8 and below may allow a remote authenticated user with at least read-only permissions to access to other organization endpoints via crafted GET requests.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortiportal | >= 5.3.0, <= 5.3.8 |
Related Weaknesses (CWE)
References
- https://fortiguard.com/psirt/FG-IR-23-408Vendor Advisory
- https://fortiguard.com/psirt/FG-IR-23-408Vendor Advisory
FAQ
What is CVE-2023-48783?
CVE-2023-48783 is a vulnerability with a CVSS score of 5.4 (MEDIUM). An Authorization Bypass Through User-Controlled Key vulnerability [CWE-639] affecting PortiPortal version 7.2.1 and below, version 7.0.6 and below, version 6.0.14 and below, version 5.3.8 and below ma...
How severe is CVE-2023-48783?
CVE-2023-48783 has been rated MEDIUM with a CVSS base score of 5.4/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-48783?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortiportal.