Cloud Defense Logo

Products

Solutions

Company

Book A Live Demo

CVE-2023-48783 : Security Advisory and Response

Learn about CVE-2023-48783, an Authorization Bypass Through User-Controlled Key vulnerability impacting FortiPortal versions 7.2.1 and below, and how to prevent unauthorized access.

Understanding CVE-2023-48783

An Authorization Bypass Through User-Controlled Key vulnerability has been identified in FortiPortal versions 7.2.1 and below, 7.0.6 and below, 6.0.14 and below, and 5.3.8 and below. This vulnerability, classified under CWE-639, may allow a remote authenticated user with at least read-only permissions to access other organization endpoints via crafted GET requests.

What is CVE-2023-48783?

CVE-2023-48783 is an Authorization Bypass Through User-Controlled Key vulnerability present in multiple versions of FortiPortal. It can potentially be exploited by a remote authenticated user to access unauthorized organization endpoints.

The Impact of CVE-2023-48783

The impact of this vulnerability is rated as MEDIUM, with a base CVSS score of 4.9. While the attack complexity is low and user interaction is not required, the confidentiality and integrity impacts are low as well. To exploit this vulnerability, a remote authenticated user only needs low privileges.

Technical Details of CVE-2023-48783

Vulnerability Description

The vulnerability allows a remote authenticated user with read-only permissions to bypass authorization controls and access other organization endpoints through crafted GET requests.

Affected Systems and Versions

FortiPortal versions 7.2.1 and below, 7.0.6 and below, 6.0.14 and below, and 5.3.8 and below are affected by this vulnerability.

Exploitation Mechanism

Remote authenticated users can exploit this vulnerability by submitting specially crafted GET requests, circumventing authorization controls to access unauthorized organization endpoints.

Mitigation and Prevention

Immediate Steps to Take

To mitigate the CVE-2023-48783 vulnerability, users are advised to upgrade to the following versions of FortiPortal:

        Version 7.2.2 or above
        Version 7.0.7 or above

Long-Term Security Practices

In the long term, users should follow security best practices such as implementing least privilege access, regularly monitoring and auditing user activities, and applying security updates promptly.

Patching and Updates

Regularly check for security updates and patches released by Fortinet to ensure that systems are protected from known vulnerabilities.

Popular CVEs

CVE Id

Published Date

Is your System Free of Underlying Vulnerabilities?
Find Out Now