- Description
- An authorization bypass through user-controlled key vulnerability [CWE-639] in Fortinet FortiPortal version 7.0.0 through 7.0.3 allows an authenticated attacker to interact with ressources of other organizations via HTTP or HTTPS requests.
- Source
- psirt@fortinet.com
- NVD status
- Analyzed
CVSS 3.1
- Type
- Primary
- Base score
- 8.1
- Impact score
- 5.2
- Exploitability score
- 2.8
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:N
- Severity
- HIGH
- psirt@fortinet.com
- CWE-639
- Hype score
- Not currently trending
🚨 CVE-2023-47543 (Published: 2024-11-12) - High severity vulnerability in Fortinet FG-IR. Affects specific versions. Remediation is crucial! For detailed guidance, check the official advisory: https://t.co/cNPxB3bp2R. Stay secure! 🔒 #CyberSecurity #Fortinet
@transilienceai
13 Nov 2024
12 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2023-47543 An authorization bypass through user-controlled key vulnerability [CWE-639] in Fortinet FortiPortal version 7.0.0 through 7.0.3 allows an authenticated attacker to in… https://t.co/q4aNNmfAkD
@CVEnew
13 Nov 2024
274 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
CVE-2023-47543 An authorization bypass through user-controlled key vulnerability [CWE-639] in Fortinet FortiPortal version 7.0.0 through 7.0.3 allows an authenticated attacker to interact with ressources of other ... https://t.co/0THsaHBVqi
@VulmonFeeds
13 Nov 2024
13 Impressions
0 Retweets
0 Likes
0 Bookmarks
0 Replies
0 Quotes
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortiportal:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "284E34AD-D835-4A57-B393-DDFAC305BA23",
"versionEndExcluding": "7.0.4",
"versionStartIncluding": "7.0.0"
}
],
"operator": "OR"
}
]
}
]