CVE-2020-15933

A exposure of sensitive information to an unauthorized actor in Fortinet FortiMail versions 6.0.9 and below, FortiMail versions 6.2.4 and below FortiMail versions 6.4.1 and 6.4.0 allows attacker to obtain potentially sensitive software-version information via client-side resources inspection.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-20-105 Patch Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:*

History

12 Jan 2022, 20:03

Type Values Removed Values Added
First Time Fortinet
Fortinet fortimail
CWE CWE-200
CPE cpe:2.3:a:fortinet:fortimail:6.2.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.3:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.4:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.2.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.4.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:6.4.1:*:*:*:*:*:*:*
CVSS v2 : unknown
v3 : unknown
v2 : 5.0
v3 : 5.3
References (CONFIRM) https://fortiguard.com/psirt/FG-IR-20-105 - (CONFIRM) https://fortiguard.com/psirt/FG-IR-20-105 - Patch, Vendor Advisory

05 Jan 2022, 12:25

Type Values Removed Values Added
New CVE

Information

Published : 2022-01-05 12:15

Updated : 2023-12-10 14:09


NVD link : CVE-2020-15933

Mitre link : CVE-2020-15933

CVE.ORG link : CVE-2020-15933


JSON object : View

Products Affected

fortinet

  • fortimail
CWE
CWE-200

Exposure of Sensitive Information to an Unauthorized Actor