CVE-2023-48786
MEDIUMDescription
A server-side request forgery vulnerability [CWE-918] in Fortinet FortiClientEMS version 7.4.0 through 7.4.2 and before 7.2.6 may allow an authenticated attacker to perform internal requests via crafted HTTP or HTTPS requests.
CVSS v3.1 Score
Weakness Type (CWE)
Affected Products
| Vendor | Product |
|---|---|
| fortinet | forticlientems |
| fortinet | forticlientems |
| fortinet | forticlientems |
| fortinet | forticlientems |
References
Advisories & Patches
Frequently Asked Questions
What is CVE-2023-48786? +
How severe is CVE-2023-48786? +
What products are affected by CVE-2023-48786? +
How do I check if I'm vulnerable to CVE-2023-48786? +
Related Vulnerabilities
pupnp is an SDK for development of UPnP device and control point applications. Prior to version 1.18.5, pupnp is vulnerable …
FastGPT is an AI Agent building platform. Prior to version 4.14.17, an unauthenticated Server-Side Request Forgery (SSRF) vulnerability allows attackers …
Squidex is an open source headless content management system and content management hub. Prior to version 7.23.0, an SSRF vulnerability …
Craft CMS is a content management system (CMS). Versions on the 4.x branch through 4.17.8 and the 5.x branch through …
GREENmod uses named pipes for communication between plugins, the web portal, and the system service, but the access control lists …
Twenty is an open source CRM built with NestJS (Node.js). In versions 1.18.0 and earlier, the SSRF protection in twenty-server's …