First published: Wed Feb 02 2022(Updated: )
A improper neutralization of input during web page generation ('cross-site scripting') in Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, version 6.3.7 and below, version 6.0.11 and below allows attacker to execute unauthorized code or commands via crafted HTTP GET requests to the FortiGuard URI protection service.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | >=6.2.0<6.2.8 | |
Fortinet FortiMail | >=6.4.0<6.4.6 | |
Fortinet FortiMail | >=7.0.0<7.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2021-43062 is a vulnerability in Fortinet FortiMail that allows an attacker to execute unauthorized code or commands through crafted HTTP GET requests.
CVE-2021-43062 has a severity value of 6.1, which is considered medium.
Fortinet FortiMail version 7.0.1 and 7.0.0, version 6.4.5 and below, and version 6.3.7 and below are affected by CVE-2021-43062.
An attacker can exploit CVE-2021-43062 by sending carefully crafted HTTP GET requests to the vulnerable FortiMail server.
Yes, Fortinet has released patches and updates to address the vulnerability. It is recommended to update to the latest version of Fortinet FortiMail.