First published: Tue Aug 03 2021(Updated: )
Instances of SQL Injection vulnerabilities in FortiSandbox's checksum search and MTA-quarantine modules may allow an authenticated attacker to execute unauthorized code on the underlying SQL interpreter via specifically crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiSandbox | <3.1.5 | |
Fortinet FortiSandbox | >=3.2.0<3.2.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2020-29011 refers to instances of SQL Injection vulnerabilities in the checksum search and MTA-quarantine modules of FortiSandbox.
CVE-2020-29011 may allow an authenticated attacker to execute unauthorized code on the underlying SQL interpreter of FortiSandbox.
FortiSandbox versions 3.2.0 through 3.2.2, and 3.1.0 through 3.1.4 are affected by CVE-2020-29011.
CVE-2020-29011 has a severity score of 8.8 (high severity).
To fix CVE-2020-29011, update FortiSandbox to a version beyond 3.2.2 or 3.1.4 as soon as possible.