Home
MEDIUM: 6.3 CVSS:3.1/AV:N/AC:H/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:CDefault status
unaffected
7.4.0 (semver)
affected
7.2.0 (semver)
affected
Default status
unaffected
1.4.0 (semver)
affected
Default status
unaffected
1.4.0 (semver)
affected
1.3.0 (semver)
affected
1.2.0
affected
1.1.0 (semver)
affected
1.0.0 (semver)
affected
Default status
unaffected
7.4.0 (semver)
affected
7.2.0 (semver)
affected
7.0.4 (semver)
affected
Default status
unaffected
24.1.10
affected
Description
An insertion of sensitive information into log file vulnerability [CWE-532] in FortiOS 7.4.0 through 7.4.3, 7.2.0 through 7.2.7, 7.0 all versions; FortiProxy 7.4.0 through 7.4.3, 7.2.0 through 7.2.11; FortiPAM 1.4 all versions, 1.3 all versions, 1.2 all versions, 1.1 all versions, 1.0 all versions and FortiSRA 1.4 all versions may allow a read-only administrator to retrieve API tokens of other administrators via observing REST API logs, if REST API logging is enabled (non-default configuration).
Problem types
Product status
7.4.0 (semver)
7.2.0 (semver)
1.4.0 (semver)
1.4.0 (semver)
1.3.0 (semver)
1.2.0
1.1.0 (semver)
1.0.0 (semver)
7.4.0 (semver)
7.2.0 (semver)
7.0.4 (semver)
24.1.10
References
fortiguard.fortinet.com/psirt/FG-IR-24-268