First published: Tue Mar 01 2022(Updated: )
An improper input validation vulnerability in the web server CGI facilities of FortiMail before 7.0.1 may allow an unauthenticated attacker to alter the environment of the underlying script interpreter via specifically crafted HTTP requests.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | <=5.4.12 | |
Fortinet FortiMail | >=6.0.0<6.0.12 | |
Fortinet FortiMail | >=6.2.0<6.2.8 | |
Fortinet FortiMail | >=6.4.0<6.4.6 | |
Fortinet FortiMail | =7.0.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-32586 is an improper input validation vulnerability in the web server CGI facilities of FortiMail before 7.0.1.
The severity of CVE-2021-32586 is critical with a severity score of 9.8.
CVE-2021-32586 affects FortiMail versions 5.4.12, 6.0.0 to 6.0.12, 6.2.0 to 6.2.8, 6.4.0 to 6.4.6, and 7.0.0.
CVE-2021-32586 allows an unauthenticated attacker to alter the environment of the underlying script interpreter via specifically crafted HTTP requests.
To fix CVE-2021-32586, users should upgrade FortiMail to version 7.0.1 or later.