CVE-2023-48789

A client-side enforcement of server-side security in Fortinet FortiPortal version 6.0.0 through 6.0.14 allows attacker to improper access control via crafted HTTP requests.
Configurations

Configuration 1 (hide)

cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*

History

02 Jan 2025, 18:33

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*
CWE NVD-CWE-Other
References () https://fortiguard.fortinet.com/psirt/FG-IR-23-406 - () https://fortiguard.fortinet.com/psirt/FG-IR-23-406 - Vendor Advisory
First Time Fortinet
Fortinet fortiportal

21 Nov 2024, 08:32

Type Values Removed Values Added
References () https://fortiguard.fortinet.com/psirt/FG-IR-23-406 - () https://fortiguard.fortinet.com/psirt/FG-IR-23-406 -

03 Jun 2024, 14:46

Type Values Removed Values Added
Summary
  • (es) Una aplicación de la seguridad del lado del servidor en Fortinet FortiPortal versión 6.0.0 a 6.0.14 permite al atacante realizar un control de acceso inadecuado a través de solicitudes HTTP manipuladas.

03 Jun 2024, 08:15

Type Values Removed Values Added
New CVE

Information

Published : 2024-06-03 08:15

Updated : 2025-01-02 18:33


NVD link : CVE-2023-48789

Mitre link : CVE-2023-48789

CVE.ORG link : CVE-2023-48789


JSON object : View

Products Affected

fortinet

  • fortiportal
CWE
CWE-602

Client-Side Enforcement of Server-Side Security

NVD-CWE-Other