An improper output neutralization for logs in Fortinet FortiWeb 6.2.0 - 6.2.8, 6.3.0 - 6.3.23, 7.0.0 - 7.0.9, 7.2.0 - 7.2.5 and 7.4.0 may allow an attacker to forge traffic logs via a crafted URL of the web application.
References
| Link | Resource |
|---|---|
| https://fortiguard.com/psirt/FG-IR-23-256 | Vendor Advisory |
| https://fortiguard.com/psirt/FG-IR-23-256 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 08:29
| Type | Values Removed | Values Added |
|---|---|---|
| References | () https://fortiguard.com/psirt/FG-IR-23-256 - Vendor Advisory |
19 Dec 2023, 18:59
| Type | Values Removed | Values Added |
|---|---|---|
| CVSS |
v2 : v3 : |
v2 : unknown
v3 : 5.3 |
| CPE | cpe:2.3:a:fortinet:fortiweb:7.4.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:* |
|
| References | () https://fortiguard.com/psirt/FG-IR-23-256 - Vendor Advisory |
13 Dec 2023, 07:15
| Type | Values Removed | Values Added |
|---|---|---|
| New CVE |
Information
Published : 2023-12-13 07:15
Updated : 2024-11-21 08:29
NVD link : CVE-2023-46713
Mitre link : CVE-2023-46713
CVE.ORG link : CVE-2023-46713
JSON object : View
Products Affected
fortinet
- fortiweb
CWE
CWE-117
Improper Output Neutralization for Logs
