<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Multiple path traversal vulnerabilities</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-23-085</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2023-10-11T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2023-10-11T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2023-10-11T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            A relative path traversal vulnerability [CWE-23] in FortiSIEM file upload components may allow an authenticated, low privileged user of the FortiSIEM GUI to escalate their privilege and replace arbitrary files on the underlying filesystem via specifically crafted HTTP requests.
        </cvrf:Note>
        <cvrf:Note Title="Description" Type="General" Ordinal="2">
            None
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="3">
            Escalation of privilege
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="4">
            FortiSIEM version 7.0.0FortiSIEM version 6.7.0 through 6.7.3FortiSIEM version 6.6.0 through 6.6.3FortiSIEM version 6.5.0 through 6.5.1FortiSIEM version 6.4.0 through 6.4.2FortiSIEM 6.3 all versions are not affectedFortiSIEM 6.2 all versions are not affectedFortiSIEM 6.1 all versions are not affectedFortiSIEM 5.4 all versions are not affectedFortiSIEM 5.3 all versions are not affected
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="5">
            Please upgrade to FortiSIEM version 7.0.1 or abovePlease upgrade to FortiSIEM version 6.7.4 or abovePlease upgrade to FortiSIEM version 6.6.4 or abovePlease upgrade to FortiSIEM version 6.5.2 or abovePlease upgrade to FortiSIEM version 6.4.3 or above
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>Internally discovered and reported by Lance Yeaw from ETAC team.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <ProductTree>
        <Branch Name="Fortinet" Type="Vendor">
            <Branch Name="FortiSIEM" Type="Product Name">
                <Branch Name="7.0.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-7.0.0">FortiSIEM 7.0.0</FullProductName>
                </Branch>
                <Branch Name="6.7.3" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.3">FortiSIEM 6.7.3</FullProductName>
                </Branch>
                <Branch Name="6.7.2" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.2">FortiSIEM 6.7.2</FullProductName>
                </Branch>
                <Branch Name="6.7.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.1">FortiSIEM 6.7.1</FullProductName>
                </Branch>
                <Branch Name="6.7.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.7.0">FortiSIEM 6.7.0</FullProductName>
                </Branch>
                <Branch Name="6.6.3" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.6.3">FortiSIEM 6.6.3</FullProductName>
                </Branch>
                <Branch Name="6.6.2" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.6.2">FortiSIEM 6.6.2</FullProductName>
                </Branch>
                <Branch Name="6.6.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.6.1">FortiSIEM 6.6.1</FullProductName>
                </Branch>
                <Branch Name="6.6.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.6.0">FortiSIEM 6.6.0</FullProductName>
                </Branch>
                <Branch Name="6.5.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.5.1">FortiSIEM 6.5.1</FullProductName>
                </Branch>
                <Branch Name="6.5.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.5.0">FortiSIEM 6.5.0</FullProductName>
                </Branch>
                <Branch Name="6.4.2" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.4.2">FortiSIEM 6.4.2</FullProductName>
                </Branch>
                <Branch Name="6.4.1" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.4.1">FortiSIEM 6.4.1</FullProductName>
                </Branch>
                <Branch Name="6.4.0" Type="Product Version">
                    <FullProductName ProductID="FortiSIEM-6.4.0">FortiSIEM 6.4.0</FullProductName>
                </Branch>
            </Branch>
        </Branch>
    </ProductTree>
    <Vulnerability Ordinal="1">
        <Title>Multiple path traversal vulnerabilities</Title>
        <cvrf:CVE>CVE-2023-40714</cvrf:CVE>
        <ProductStatuses>
            <Status Type="Known Affected">
                <ProductID>FortiSIEM-7.0.0</ProductID>
                <ProductID>FortiSIEM-6.7.3</ProductID>
                <ProductID>FortiSIEM-6.7.2</ProductID>
                <ProductID>FortiSIEM-6.7.1</ProductID>
                <ProductID>FortiSIEM-6.7.0</ProductID>
                <ProductID>FortiSIEM-6.6.3</ProductID>
                <ProductID>FortiSIEM-6.6.2</ProductID>
                <ProductID>FortiSIEM-6.6.1</ProductID>
                <ProductID>FortiSIEM-6.6.0</ProductID>
                <ProductID>FortiSIEM-6.5.1</ProductID>
                <ProductID>FortiSIEM-6.5.0</ProductID>
                <ProductID>FortiSIEM-6.4.2</ProductID>
                <ProductID>FortiSIEM-6.4.1</ProductID>
                <ProductID>FortiSIEM-6.4.0</ProductID>
            </Status>
        </ProductStatuses>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>9.2</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:C/C:H/I:H/A:H/E:F/RL:O/RC:C</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-23-085</URL>
                <Description>Multiple path traversal vulnerabilities</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>