FortiLogger 4.4.2.2 Arbitrary File Upload via Content-Type header
Reporter | Title | Published | Views | Family All 14 |
---|---|---|---|---|
![]() | FortiLogger 4.4.2.2 - Unauthenticated Arbitrary File Upload (Metasploit) | 1 Mar 202100:00 | – | exploitdb |
![]() | FortiLogger Arbitrary File Upload (CVE-2021-3378) | 5 Apr 202100:00 | – | checkpoint_advisories |
![]() | FortiLogger Arbitrary File Upload Exploit | 1 Mar 202114:55 | – | metasploit |
![]() | FortiLogger 4.4.2.2 - Arbitrary File Upload | 1 Mar 202100:32 | – | nuclei |
![]() | CVE-2021-3378 | 1 Feb 202123:15 | – | nvd |
![]() | FortiLogger Arbitrary File Upload Exploit | 28 Mar 202100:00 | – | zdt |
![]() | FortiLogger 4.4.2.2 - Unauthenticated Arbitrary File Upload Exploit | 1 Mar 202100:00 | – | zdt |
![]() | Exploit for Unrestricted Upload of File with Dangerous Type in Fortilogger | 30 Jan 202123:47 | – | githubexploit |
![]() | CVE-2021-3378 | 1 Mar 202100:00 | – | circl |
![]() | Design/Logic Flaw | 1 Feb 202123:15 | – | prion |
Parameter | Position | Path | Description | CWE |
---|---|---|---|---|
file | request body | /Config/SaveUploadedHotspotLogoFile | Arbitrary file upload endpoint that allows uploading files with malicious content. | CWE-434 |
Transform Your Security Services
Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.
Book a live demo