CVE-2024-31487
 
Severity Score
Exploit Likelihood
Affected Versions
Public Exploits
0Exploited in Wild
-Decision
Descriptions
A improper limitation of a pathname to a restricted directory ('path traversal') in Fortinet FortiSandbox version 4.4.0 through 4.4.4 and 4.2.0 through 4.2.6 and 4.0.0 through 4.0.5 and 3.2.0 through 3.2.4 and 3.1.0 through 3.1.5 and 3.0.0 through 3.0.7 and 2.5.0 through 2.5.2 and 2.4.0 through 2.4.1 may allows attacker to information disclosure via crafted http requests.
Una limitación inadecuada de un nombre de ruta a un directorio restringido ("path traversal") en Fortinet FortiSandbox versión 4.4.0 a 4.4.4 y 4.2.0 a 4.2.6 y 4.0.0 a 4.0.5 y 3.2.0 a 3.2. 4 y 3.1.0 a 3.1.5 y 3.0.0 a 3.0.7 y 2.5.0 a 2.5.2 y 2.4.0 a 2.4.1 pueden permitir al atacante la divulgación de información a través de solicitudes http manipuladas.
CVSS Scores
SSVC
- Decision:Track
Timeline
- 2024-04-04 CVE Reserved
- 2024-04-09 CVE Published
- 2024-04-21 EPSS Updated
- 2024-08-02 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
- CWE-22: Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')
CAPEC
References (1)
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Fortinet Search vendor "Fortinet" | FortiSandbox Search vendor "Fortinet" for product "FortiSandbox" | >= 4.4.0 <= 4.4.4 Search vendor "Fortinet" for product "FortiSandbox" and version " >= 4.4.0 <= 4.4.4" | en |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | FortiSandbox Search vendor "Fortinet" for product "FortiSandbox" | >= 4.2.0 <= 4.2.6 Search vendor "Fortinet" for product "FortiSandbox" and version " >= 4.2.0 <= 4.2.6" | en |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | FortiSandbox Search vendor "Fortinet" for product "FortiSandbox" | >= 4.0.0 <= 4.0.5 Search vendor "Fortinet" for product "FortiSandbox" and version " >= 4.0.0 <= 4.0.5" | en |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | FortiSandbox Search vendor "Fortinet" for product "FortiSandbox" | >= 3.2.0 <= 3.2.4 Search vendor "Fortinet" for product "FortiSandbox" and version " >= 3.2.0 <= 3.2.4" | en |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | FortiSandbox Search vendor "Fortinet" for product "FortiSandbox" | >= 3.1.0 <= 3.1.5 Search vendor "Fortinet" for product "FortiSandbox" and version " >= 3.1.0 <= 3.1.5" | en |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | FortiSandbox Search vendor "Fortinet" for product "FortiSandbox" | >= 3.0.0 <= 3.0.7 Search vendor "Fortinet" for product "FortiSandbox" and version " >= 3.0.0 <= 3.0.7" | en |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | FortiSandbox Search vendor "Fortinet" for product "FortiSandbox" | >= 2.5.0 <= 2.5.2 Search vendor "Fortinet" for product "FortiSandbox" and version " >= 2.5.0 <= 2.5.2" | en |
Affected
| ||||||
Fortinet Search vendor "Fortinet" | FortiSandbox Search vendor "Fortinet" for product "FortiSandbox" | >= 2.4.0 <= 2.4.1 Search vendor "Fortinet" for product "FortiSandbox" and version " >= 2.4.0 <= 2.4.1" | en |
Affected
|