7.5
CVSSv2

CVE-2021-3378

Published: 01/02/2021 Updated: 31/03/2021
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
CVSS v3 Base Score: 9.8 | Impact Score: 5.9 | Exploitability Score: 3.9
VMScore: 668
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

FortiLogger 4.4.2.2 is affected by Arbitrary File Upload by sending a "Content-Type: image/png" header to Config/SaveUploadedHotspotLogoFile and then visiting Assets/temp/hotspot/img/logohotspot.asp.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

fortilogger fortilogger

Exploits

This Metasploit module exploits an unauthenticated arbitrary file upload via an insecure POST request to Fortilogger It has been tested on version 4422 in Windows 10 Enterprise ...
This Metasploit module exploits an unauthenticated arbitrary file upload in FortiLogger via an insecure POST request It has been tested on versions prior to 520 in Windows 10 Enterprise ...

Github Repositories

CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit)

CVE-2021-3378 | FortiLogger - Unauthenticated Arbitrary File Upload (Metasploit) Date: 30-01-2021 Exploit Author: Berkan Er b3rsec@protonmailcom Vendor Homepage: wwwfortiloggercom/ Software Link: wwwfortiloggercom/download Version: 4422 Tested on: Windows 10 Enterprise x64 CVE: 2021-3378 Disclosure Date: 26-02-2021 This module exploits an unauthenticat