{"cve_id":"CVE-2018-13379","summary":"An Improper Limitation of a Pathname to a Restricted Directory (\"Path Traversal\") in Fortinet FortiOS 6.0.0 to 6.0.4, 5.6.3 to 5.6.7 and 5.4.6 to 5.4.12 and FortiProxy 2.0.0, 1.2.0 to 1.2.8, 1.1.0 to 1.1.6, 1.0.0 to 1.0.7 under SSL VPN web portal allows an unauthenticated attacker to download system files via special crafted HTTP resource requests.","cvss":9.1,"cvss_version":3.0,"cvss_v2":5.0,"cvss_v3":9.1,"epss":0.94473,"ranking_epss":0.99998,"kev":true,"propose_action":"Fortinet FortiOS SSL VPN web portal contains a path traversal vulnerability that may allow an unauthenticated attacker to download FortiOS system files through specially crafted HTTP resource requests.","ransomware_campaign":"Known","references":["https://fortiguard.com/advisory/FG-IR-18-384","https://www.fortiguard.com/psirt/FG-IR-20-233","https://fortiguard.com/advisory/FG-IR-18-384","https://www.fortiguard.com/psirt/FG-IR-20-233","https://www.cisa.gov/known-exploited-vulnerabilities-catalog?field_cve=CVE-2018-13379"],"published_time":"2019-06-04T21:29:00","cpes":["cpe:2.3:a:fortinet:fortiproxy:1.0.0","cpe:2.3:a:fortinet:fortiproxy:1.0.1","cpe:2.3:a:fortinet:fortiproxy:1.0.2","cpe:2.3:a:fortinet:fortiproxy:1.0.3","cpe:2.3:a:fortinet:fortiproxy:1.0.4","cpe:2.3:a:fortinet:fortiproxy:1.0.5","cpe:2.3:a:fortinet:fortiproxy:1.0.6","cpe:2.3:a:fortinet:fortiproxy:1.0.7","cpe:2.3:a:fortinet:fortiproxy:1.1.0","cpe:2.3:a:fortinet:fortiproxy:1.1.1","cpe:2.3:a:fortinet:fortiproxy:1.1.2","cpe:2.3:a:fortinet:fortiproxy:1.1.3","cpe:2.3:a:fortinet:fortiproxy:1.1.4","cpe:2.3:a:fortinet:fortiproxy:1.1.5","cpe:2.3:a:fortinet:fortiproxy:1.1.6","cpe:2.3:a:fortinet:fortiproxy:1.2.0","cpe:2.3:a:fortinet:fortiproxy:1.2.1","cpe:2.3:a:fortinet:fortiproxy:1.2.2","cpe:2.3:a:fortinet:fortiproxy:1.2.3","cpe:2.3:a:fortinet:fortiproxy:1.2.4","cpe:2.3:a:fortinet:fortiproxy:1.2.5","cpe:2.3:a:fortinet:fortiproxy:1.2.6","cpe:2.3:a:fortinet:fortiproxy:1.2.7","cpe:2.3:a:fortinet:fortiproxy:1.2.8","cpe:2.3:a:fortinet:fortiproxy:2.0.0","cpe:2.3:o:fortinet:fortios:5.4.10","cpe:2.3:o:fortinet:fortios:5.4.11","cpe:2.3:o:fortinet:fortios:5.4.12","cpe:2.3:o:fortinet:fortios:5.4.6","cpe:2.3:o:fortinet:fortios:5.4.7","cpe:2.3:o:fortinet:fortios:5.4.8","cpe:2.3:o:fortinet:fortios:5.4.9","cpe:2.3:o:fortinet:fortios:5.6.3","cpe:2.3:o:fortinet:fortios:5.6.4","cpe:2.3:o:fortinet:fortios:5.6.5","cpe:2.3:o:fortinet:fortios:5.6.6","cpe:2.3:o:fortinet:fortios:5.6.7","cpe:2.3:o:fortinet:fortios:6.0.0","cpe:2.3:o:fortinet:fortios:6.0.1","cpe:2.3:o:fortinet:fortios:6.0.2","cpe:2.3:o:fortinet:fortios:6.0.3","cpe:2.3:o:fortinet:fortios:6.0.4"]}