CVE-2018-13379

Scores

EPSS

0.945High94.5%
0%20%40%60%80%100%

Percentile: 94.5%

CVSS

9.8Critical3.x
0246810

CVSS Score: 9.8/10

All CVSS Scores

CVSS 3.x
9.8

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Description

An Improper Limitation of a Pathname to a Restricted Directory (“Path Traversal”) in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

nvd

CWEs

CWE-22

Related Vulnerabilities

Exploits

Exploit ID: 47287

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47287

Exploit ID: 47288

Source: exploitdb

URL: https://www.exploit-db.com/exploits/47288

Exploit ID: CVE-2018-13379

Source: github-poc

URL: https://github.com/nivdolgin/CVE-2018-13379

Vulnerable Software (2)

Type: Configuration

Vendor: fortinet

Product: fortios

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.2.9",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:for...

Source: nvd

Type: Configuration

Vendor: fortinet

Product: fortiproxy

Operating System: * * *

Trait:
{
  "cpe_match": [
    {
      "cpe23uri": "cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:*",
      "versionEndExcluding": "1.2.9",
      "vulnerable": true
    },
    {
      "cpe23uri": "cpe:2.3:a:for...

Source: nvd