Fortinet FortiOS, FortiProxy and FortiSwitchManager directory traversal | CVE-2022-42474
NAME
__________
Fortinet FortiOS, FortiProxy and FortiSwitchManager directory traversal
Platforms Affected:
Fortinet FortiProxy 2.0.0
Fortinet FortiProxy 1.1
Fortinet FortiOS 7.0.0
Fortinet FortiProxy 1.0
Fortinet FortiProxy 7.0.0
Fortinet FortiOS 7.2.0
Fortinet FortiProxy 7.2.0
Fortinet FortiSwitchManager 7.0.0
Fortinet FortiSwitchManager 7.2.0
Fortinet FortiProxy 1.2
Fortinet FortiProxy 7.0.7
Fortinet FortiProxy 7.2.1
Fortinet FortiOS 6.4
Fortinet FortiOS 6.2
Fortinet FortiOS 7.2.3
Fortinet FortiOS 7.0.9
Fortinet FortiProxy 2.0.11
Fortinet FortiOS 6.4.12
Risk Level:
6.5
Exploitability:
Unproven
Consequences:
File Manipulation
DESCRIPTION
__________
Fortinet FortiOS, FortiProxy and FortiSwitchManager could allow a remote authenticated attacker to traverse directories on the system. An attacker could send a specially crafted request to delete arbitrary directories from the filesystem.
CVSS 3.0 Information
__________
Privileges Required:
High
User Interaction:
None
Scope:
Unchanged
Access Vector:
Network
A considerable amount of time and effort goes into maintaining this website, creating backend automation and creating new features and content for you to make actionable intelligence decisions. Everyone that supports the site helps enable new functionality.
If you like the site, please support us on “Patreon” or “Buy Me A Coffee” using the buttons below
![Fortinet FortiOS, FortiProxy and FortiSwitchManager directory traversal | CVE-2022-42474 1 Buy Me A Coffee](https://www.redpacketsecurity.com/wp-content/uploads/2022/10/buymeacoffee.png)
![Fortinet FortiOS, FortiProxy and FortiSwitchManager directory traversal | CVE-2022-42474 2 Patreon](https://www.redpacketsecurity.com/wp-content/uploads/2021/01/Digital-Patreon-Wordmark_FieryCoralv2-1024x209.png)
To keep up to date follow us on the below channels.