Show plain JSON{"id": "CVE-2022-23447", "metrics": {"cvssMetricV31": [{"type": "Secondary", "source": "psirt@fortinet.com", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}, {"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"scope": "UNCHANGED", "version": "3.1", "baseScore": 7.5, "attackVector": "NETWORK", "baseSeverity": "HIGH", "vectorString": "CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N", "integrityImpact": "NONE", "userInteraction": "NONE", "attackComplexity": "LOW", "availabilityImpact": "NONE", "privilegesRequired": "NONE", "confidentialityImpact": "HIGH"}, "impactScore": 3.6, "exploitabilityScore": 3.9}]}, "published": "2023-07-11T17:15:10.383", "references": [{"url": "https://fortiguard.com/psirt/FG-IR-22-039", "tags": ["Vendor Advisory"], "source": "psirt@fortinet.com"}, {"url": "https://fortiguard.com/psirt/FG-IR-22-039", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Modified", "weaknesses": [{"type": "Secondary", "source": "psirt@fortinet.com", "description": [{"lang": "en", "value": "CWE-22"}]}, {"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-22"}]}], "descriptions": [{"lang": "en", "value": "An improper limitation of a pathname to a restricted directory ('Path Traversal') vulnerability [CWE-22] in FortiExtender management interface 7.0.0 through 7.0.3, 4.2.0 through 4.2.4, 4.1.1 through 4.1.8, 4.0.0 through 4.0.2, 3.3.0 through 3.3.2, 3.2.1 through 3.2.3, 5.3 all versions may allow an unauthenticated and remote attacker to retrieve\u00a0arbitrary files from the underlying filesystem via specially crafted web requests."}], "lastModified": "2024-11-21T06:48:34.377", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D7C7C2CF-4343-4DC6-A9CC-2AD085FF4719", "versionEndExcluding": "3.2.4", "versionStartIncluding": "3.2.1"}, {"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "BF3BA216-3C90-451D-99AC-DC64259A1312", "versionEndExcluding": "3.3.3", "versionStartIncluding": "3.3.0"}, {"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "42280061-9248-48CF-98E1-89B83D044137", "versionEndExcluding": "4.0.3", "versionStartIncluding": "4.0.0"}, {"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "D6594D0E-3A47-4E9F-B020-FBC2C1AED759", "versionEndExcluding": "4.1.9", "versionStartIncluding": "4.1.1"}, {"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "48A96D42-A019-422C-AB50-7CAF378FDDE5", "versionEndExcluding": "4.2.5", "versionStartIncluding": "4.2.0"}, {"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "46532FCC-760C-43ED-8DC4-81427D279980", "versionEndExcluding": "7.0.4", "versionStartIncluding": "7.0.0"}, {"criteria": "cpe:2.3:o:fortinet:fortiextender_firmware:5.3.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "1CC2C9D3-01FD-4D5B-AE85-05B0CA6C99AA"}], "operator": "OR"}, {"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:h:fortinet:fortiextender:-:*:*:*:*:*:*:*", "vulnerable": false, "matchCriteriaId": "A0617C1D-E321-409D-B54B-775E854A03C1"}], "operator": "OR"}], "operator": "AND"}], "sourceIdentifier": "psirt@fortinet.com"}