{"resultsPerPage":1,"startIndex":0,"totalResults":1,"format":"NVD_CVE","version":"2.0","timestamp":"2026-05-04T19:26:59.045","vulnerabilities":[{"cve":{"id":"CVE-2023-44256","sourceIdentifier":"psirt@fortinet.com","published":"2023-10-20T10:15:12.870","lastModified":"2024-11-21T08:25:31.910","vulnStatus":"Modified","cveTags":[],"descriptions":[{"lang":"en","value":"A server-side request forgery vulnerability [CWE-918] in Fortinet FortiAnalyzer version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 and FortiManager version 7.4.0, version 7.2.0 through 7.2.3 and before 7.0.8 allows a remote attacker with low privileges to view sensitive data from internal servers or perform a local port scan via a crafted HTTP request."},{"lang":"es","value":"Una vulnerabilidad de server-side request forgery [CWE-918] en Fortinet FortiAnalyzer versión 7.4.0, versión 7.2.0 a 7.2.3 y anteriores a 7.0.8 y FortiManager versión 7.4.0, versión 7.2.0 a 7.2.3 y anteriores 7.0.8 permite a un atacante remoto con privilegios bajos ver datos confidenciales de servidores internos o realizar un escaneo de puerto local a través de una solicitud HTTP manipulada."}],"metrics":{"cvssMetricV31":[{"source":"psirt@fortinet.com","type":"Secondary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:A/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"ADJACENT_NETWORK","attackComplexity":"LOW","privilegesRequired":"NONE","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6},{"source":"nvd@nist.gov","type":"Primary","cvssData":{"version":"3.1","vectorString":"CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:N/A:N","baseScore":6.5,"baseSeverity":"MEDIUM","attackVector":"NETWORK","attackComplexity":"LOW","privilegesRequired":"LOW","userInteraction":"NONE","scope":"UNCHANGED","confidentialityImpact":"HIGH","integrityImpact":"NONE","availabilityImpact":"NONE"},"exploitabilityScore":2.8,"impactScore":3.6}]},"weaknesses":[{"source":"psirt@fortinet.com","type":"Secondary","description":[{"lang":"en","value":"CWE-22"}]},{"source":"nvd@nist.gov","type":"Primary","description":[{"lang":"en","value":"CWE-918"}]}],"configurations":[{"nodes":[{"operator":"OR","negate":false,"cpeMatch":[{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"6.4.8","versionEndIncluding":"6.4.13","matchCriteriaId":"C9BAF9ED-0E72-448F-BA35-A07541B900F2"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.2","versionEndIncluding":"7.0.8","matchCriteriaId":"A1650789-366E-4CA3-814E-DC68B9F318DE"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.0","versionEndIncluding":"7.2.3","matchCriteriaId":"B31BB84A-E622-4911-AAB4-41E57F661A8D"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortianalyzer:7.4.0:*:*:*:*:*:*:*","matchCriteriaId":"91A9AF01-72FD-4942-A95E-71A7609B6977"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*","versionStartIncluding":"7.0.0","versionEndIncluding":"7.0.8","matchCriteriaId":"7AEFC8D4-6358-4A81-BCF3-D162871F59F1"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*","versionStartIncluding":"7.2.0","versionEndIncluding":"7.2.3","matchCriteriaId":"7C7C73B7-2AE1-4FC2-A37A-89A085796D19"},{"vulnerable":true,"criteria":"cpe:2.3:a:fortinet:fortimanager:7.4.0:*:*:*:*:*:*:*","matchCriteriaId":"DBBF7219-D15F-43C9-9A90-1A4B062431E4"}]}]}],"references":[{"url":"https://fortiguard.com/psirt/FG-IR-19-039","source":"psirt@fortinet.com","tags":["Vendor Advisory"]},{"url":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-p5mc-8vrh","source":"psirt@fortinet.com","tags":["Exploit","Third Party Advisory"]},{"url":"https://fortiguard.com/psirt/FG-IR-19-039","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Vendor Advisory"]},{"url":"https://github.com/orangecertcc/security-research/security/advisories/GHSA-2hc5-p5mc-8vrh","source":"af854a3a-2127-422b-91ae-364da2661108","tags":["Exploit","Third Party Advisory"]}]}}]}