CVE-2024-48892
Unknown
Unknown - Not Provided
BaseFortify
Publication date: 2025-08-12
Last updated on: 2025-08-14
Assigner: Fortinet, Inc.
Description
Description
A relative path traversal vulnerability [CWE-23] in FortiSOAR 7.6.0, 7.5.0 through 7.5.1, 7.4 all versions, 7.3 all versions may allow an authenticated attacker to read arbitrary files via uploading a malicious solution pack.
CVSS Scores
EPSS Scores
| Probability: | |
| Percentile: |
Meta Information
Affected Vendors & Products
| Vendor | Product | Version / Range |
|---|---|---|
| fortinet | fortisoar | From 7.3.0 (inc) to 7.5.2 (exc) |
| fortinet | fortisoar | 7.6.0 |
Helpful Resources
Exploitability
| CWE ID | Description |
|---|---|
| CWE-23 | The product uses external input to construct a pathname that should be within a restricted directory, but it does not properly neutralize sequences such as ".." that can resolve to a location that is outside of that directory. |
Attack-Flow Graph
AI Powered Q&A
Can you explain this vulnerability to me?
This vulnerability is a relative path traversal issue in FortiSOAR versions 7.6.0, 7.5.0 through 7.5.1, 7.4 all versions, and 7.3 all versions. It allows an authenticated attacker to read arbitrary files on the system by uploading a malicious solution pack.
How can this vulnerability impact me? :
An attacker who exploits this vulnerability can read sensitive files on the affected system without proper authorization, potentially exposing confidential information. This can lead to data breaches and compromise system security.
Ask Our AI Assistant
Need more information? Ask your question to get an AI reply (Powered by our expertise)
0/70