Lucene search

K
cveFortinetCVE-2022-30300
HistoryFeb 16, 2023 - 7:15 p.m.

CVE-2022-30300

2023-02-1619:15:12
CWE-23
CWE-22
fortinet
web.nvd.nist.gov
20
cve-2022-30300
cwe-23
fortiweb
security vulnerability
path traversal
http get request

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

39.1%

A relative path traversal vulnerability [CWE-23] in FortiWeb 7.0.0 through 7.0.1, 6.3.6 through 6.3.18, 6.4 all versions may allow an authenticated attacker to obtain unauthorized access to files and data via specifically crafted HTTP GET requests.

Affected configurations

Nvd
Node
fortinetfortiwebRange6.3.66.3.19
OR
fortinetfortiwebMatch6.4.0
OR
fortinetfortiwebMatch6.4.1
OR
fortinetfortiwebMatch6.4.2
OR
fortinetfortiwebMatch7.0.0
OR
fortinetfortiwebMatch7.0.1
VendorProductVersionCPE
fortinetfortiweb*cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
fortinetfortiweb6.4.0cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
fortinetfortiweb6.4.1cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*
fortinetfortiweb6.4.2cpe:2.3:a:fortinet:fortiweb:6.4.2:*:*:*:*:*:*:*
fortinetfortiweb7.0.0cpe:2.3:a:fortinet:fortiweb:7.0.0:*:*:*:*:*:*:*
fortinetfortiweb7.0.1cpe:2.3:a:fortinet:fortiweb:7.0.1:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiWeb",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.0.0",
        "lessThanOrEqual": "7.0.1",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.4.0",
        "lessThanOrEqual": "6.4.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "6.3.6",
        "lessThanOrEqual": "6.3.18",
        "status": "affected"
      }
    ]
  }
]

CVSS3

6.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N

AI Score

6.2

Confidence

High

EPSS

0.001

Percentile

39.1%

Related for CVE-2022-30300