First published: Wed Dec 08 2021(Updated: )
A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to use the device as proxy via crafted GET parameters in requests to error handlers
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiWeb | >=6.0.0<=6.0.7 | |
Fortinet FortiWeb | >=6.2.0<=6.2.6 | |
Fortinet FortiWeb | >=6.3.0<=6.3.15 | |
Fortinet FortiWeb | =6.1.0 | |
Fortinet FortiWeb | =6.1.1 | |
Fortinet FortiWeb | =6.1.2 | |
Fortinet FortiWeb | =6.4.0 | |
Fortinet FortiWeb | =6.4.1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID of this Fortinet FortiWeb vulnerability is CVE-2021-36191.
The severity level of CVE-2021-36191 is medium with a score of 5.4.
Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below, 6.2.6 and below, 6.1.2 and below, and 6.0.7 and below are affected by CVE-2021-36191.
CVE-2021-36191 allows an attacker to use the Fortinet FortiWeb device as a proxy by exploiting crafted GET parameters in requests to error handlers.
Yes, it is recommended to upgrade Fortinet FortiWeb to a version that is not affected by CVE-2021-36191.