Readonly users could run some sensitive operations

Summary

A client-side enforcement of server-side security vulnerability [CWE-602] in FortiAnalyzer may allow an authenticated attacker with at least read-only permission to execute sensitive operations via crafted requests.

Version Affected Solution
FortiAnalyzer 7.6 Not affected Not Applicable
FortiAnalyzer 7.4 7.4.0 through 7.4.2 Upgrade to 7.4.3 or above
FortiAnalyzer 7.2 7.2.0 through 7.2.5 Upgrade to 7.2.6 or above
FortiAnalyzer 7.0 7.0.0 through 7.0.12 Upgrade to 7.0.13 or above
FortiAnalyzer 6.4 6.4.0 through 6.4.14 Upgrade to 6.4.15 or above
FortiAnalyzer-BigData 7.4 7.4.0 Upgrade to 7.4.1 or above
FortiAnalyzer-BigData 7.2 7.2.0 through 7.2.6 Upgrade to 7.2.7 or above
FortiAnalyzer-BigData 7.0 7.0 all versions Migrate to a fixed release
FortiAnalyzer-BigData 6.4 6.4 all versions Migrate to a fixed release
FortiAnalyzer-BigData 6.2 6.2 all versions Migrate to a fixed release
FortiManager 7.6 Not affected Not Applicable
FortiManager 7.4 7.4.0 through 7.4.2 Upgrade to 7.4.3 or above
FortiManager 7.2 7.2.0 through 7.2.5 Upgrade to 7.2.6 or above
FortiManager 7.0 7.0.0 through 7.0.12 Upgrade to 7.0.13 or above
FortiManager 6.4 6.4.0 through 6.4.14 Upgrade to 6.4.15 or above

Acknowledgement

Fortinet is pleased to thank security researchers Paul BARBE, Antoine CARRINCAZEAUX and Clément AMIC from Synacktiv (https://www.synacktiv.com) for discovering and reporting this vulnerability under responsible disclosure.

Timeline

2024-11-12: Initial publication