Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-w9rm-93rw-98gq

Опубликовано: 02 окт. 2025
Источник: github
Github: Не прошло ревью
CVSS3: 6.7

Описание

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2 all versions, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2 all versions, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

EPSS

Процентиль: 2%
0.00015
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-288

Связанные уязвимости

CVSS3: 6.7
nvd
4 месяца назад

An Authentication Bypass Using an Alternate Path or Channel vulnerability [CWE-288] in FortiOS 7.4.0 through 7.4.7, 7.2.0 through 7.2.11, 7.0.6 and above; and FortiProxy 7.6.0 through 7.6.2, 7.4.0 through 7.4.8, 7.2 all versions, 7.0.5 and above may allow an authenticated attacker to elevate their privileges via triggering a malicious Webhook action in the Automation Stitch component.

CVSS3: 4.7
fstec
8 месяцев назад

Уязвимость компрнента Automation Stitch операционных систем FortiOS и прокси-сервера для защиты от интернет-атак FortiProxy, позволяющая нарушителю обойти процедуру аутентификации и повысить свои привилегии

EPSS

Процентиль: 2%
0.00015
Низкий

6.7 Medium

CVSS3

Дефекты

CWE-288