Headline
CVE-2022-30302: Fortiguard
Multiple relative path traversal vulnerabilities [CWE-23] in FortiDeceptor management interface 1.0.0 through 3.2.x, 3.3.0 through 3.3.2, 4.0.0 through 4.0.1 may allow a remote and authenticated attacker to retrieve and delete arbitrary files from the underlying filesystem via specially crafted web requests.
** PSIRT Advisories**
FortiDeceptor - Path traversal vulnerability
Summary
Multiple relative path traversal vulnerabilities [CWE-23] in FortiDeceptor management interface may allow a remote and authenticated attacker to retrieve and delete arbitrary files from the underlying filesystem via specially crafted web requests.
Affected Products
FortiDeceptor version 1.0.0 through 1.0.1
FortiDeceptor version 1.1.0
FortiDeceptor version 2.0.0
FortiDeceptor version 2.1.0
FortiDeceptor version 3.0.0 through 3.0.2
FortiDeceptor version 3.1.0 through 3.1.1
FortiDeceptor version 3.2.0 through 3.2.2
FortiDeceptor version 3.3.0 through 3.3.2
FortiDeceptor version 4.0.0 through 4.0.1
Solutions
Please upgrade to FortiDeceptor version 4.1.0 or above
Please upgrade to FortiDeceptor version 4.0.2 or above
Please upgrade to FortiDeceptor version 3.3.3 or above
Acknowledgement
Internally discovered and reported by Wilfried Djettchou of Fortinet Product Security team.
Related news
Four high, six medium, and one low severity issue fixed
Cisco on Wednesday rolled out patches for 10 security flaws spanning multiple products, one of which is rated Critical in severity and could be weaponized to conduct absolute path traversal attacks. The issues, tracked as CVE-2022-20812 and CVE-2022-20813, affect Cisco Expressway Series and Cisco TelePresence Video Communication Server (VCS) and "could allow a remote attacker to overwrite