Path Traversal in agent leads to Privilege Escalation

Summary

An Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal') vulnerability [CWE-22] in FortiDLP Agent's Outlookproxy plugin for Windows and MacOS may allow an authenticated attacker to escalate their privileges to LocalService or Root privilege via sending a crafted request to a local listening port.

Version Affected Solution
FortiDLP 12.1 Not affected Not Applicable
FortiDLP 12.0 Not affected Not Applicable
FortiDLP 11.5 11.5 all versions Migrate to a fixed release
FortiDLP 11.4 11.4 all versions Migrate to a fixed release
FortiDLP 11.3 11.3 all versions Migrate to a fixed release
FortiDLP 11.2 11.2 all versions Migrate to a fixed release
FortiDLP 11.1 11.1 all versions Migrate to a fixed release
FortiDLP 11.0 11.0 all versions Migrate to a fixed release
FortiDLP 10.5 10.5 all versions Migrate to a fixed release
FortiDLP 10.4 10.4 all versions Migrate to a fixed release
FortiDLP 10.3 10.3 all versions Migrate to a fixed release
FortiDLP 6.0 Not affected Not Applicable

Acknowledgement

Internally discovered and reported by developers of FortiDLP team.

Timeline

2025-10-14: Initial publication