CVE-2021-32586

An improper input validation vulnerability in the web server CGI facilities of FortiMail before 7.0.1 may allow an unauthenticated attacker to alter the environment of the underlying script interpreter via specifically crafted HTTP requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-21-008 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*

History

09 Mar 2022, 14:11

Type Values Removed Values Added
CPE cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
CWE CWE-20
References (CONFIRM) https://fortiguard.com/psirt/FG-IR-21-008 - (CONFIRM) https://fortiguard.com/psirt/FG-IR-21-008 - Vendor Advisory

01 Mar 2022, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-01 19:15

Updated : 2024-02-04 22:29


NVD link : CVE-2021-32586

Mitre link : CVE-2021-32586

CVE.ORG link : CVE-2021-32586


JSON object : View

Products Affected

fortinet

  • fortimail
CWE
CWE-20

Improper Input Validation