- Description
- An improper input validation vulnerability in the web server CGI facilities of FortiMail before 7.0.1 may allow an unauthenticated attacker to alter the environment of the underlying script interpreter via specifically crafted HTTP requests.
- Source
- psirt@fortinet.com
- NVD status
- Modified
CVSS 3.1
- Type
- Primary
- Base score
- 9.8
- Impact score
- 5.9
- Exploitability score
- 3.9
- Vector string
- CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
- Severity
- CRITICAL
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
- nvd@nist.gov
- CWE-20
- Hype score
- Not currently trending
[
{
"nodes": [
{
"negate": false,
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "012B958E-B46C-4E94-91FA-6E0083739215",
"versionEndIncluding": "5.4.12"
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "949AE030-B3F8-496D-AB9A-8F34203C3CB0",
"versionEndExcluding": "6.0.12",
"versionStartIncluding": "6.0.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9BAEA8B7-C4D3-4C12-8EF0-77A3F0EF2A14",
"versionEndExcluding": "6.2.8",
"versionStartIncluding": "6.2.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "9ABBEADA-F0B2-4661-ADEA-4E9998564E69",
"versionEndExcluding": "6.4.6",
"versionStartIncluding": "6.4.0"
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*",
"vulnerable": true,
"matchCriteriaId": "15993051-6D79-4D59-B43D-EE3DA539AA18"
}
],
"operator": "OR"
}
]
}
]