CVE-2021-32586

An improper input validation vulnerability in the web server CGI facilities of FortiMail before 7.0.1 may allow an unauthenticated attacker to alter the environment of the underlying script interpreter via specifically crafted HTTP requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-21-008 Vendor Advisory
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*

History

09 Mar 2022, 14:11

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 7.5
v3 : 9.8
First Time Fortinet
Fortinet fortimail
References (CONFIRM) https://fortiguard.com/psirt/FG-IR-21-008 - (CONFIRM) https://fortiguard.com/psirt/FG-IR-21-008 - Vendor Advisory
CWE CWE-20
CPE cpe:2.3:a:fortinet:fortimail:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*

01 Mar 2022, 19:15

Type Values Removed Values Added
New CVE

Information

Published : 2022-03-01 19:15

Updated : 2023-12-10 14:22


NVD link : CVE-2021-32586

Mitre link : CVE-2021-32586

CVE.ORG link : CVE-2021-32586


JSON object : View

Products Affected

fortinet

  • fortimail
CWE
CWE-20

Improper Input Validation