Improper Input Neutralization in FortiMail by Fortinet
CVE-2023-36637

3.4LOW

Key Information:

Vendor
Fortinet
Status
Vendor
CVE Published:
10 October 2023

Summary

FortiMail, developed by Fortinet, exhibits a vulnerability wherein an authenticated attacker can exploit improper input validation during web page generation. This weakness allows the malicious injection of HTML tags into FortiMail's calendar through certain input fields, potentially compromising the integrity and security of user data. It is crucial for users of FortiMail versions 7.2.0, 7.2.1, 7.2.2, and earlier than 7.0.5 to implement necessary security measures to mitigate this risk.

Affected Version(s)

FortiMail 7.2.0 <= 7.2.2

FortiMail 7.0.1 <= 7.0.5

References

CVSS V3.1

Score:
3.4
Severity:
LOW
Confidentiality:
None
Integrity:
Low
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
Low
User Interaction:
Required
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

.