First published: Tue Oct 10 2023(Updated: )
An incorrect authorization vulnerability [CWE-863] in FortiMail webmail version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.5 and below 6.4.7 allows an authenticated attacker to login on other users accounts from the same web domain via crafted HTTP or HTTPs requests.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | >=6.0.0<=6.0.12 | |
Fortinet FortiMail | >=6.2.0<=6.2.9 | |
Fortinet FortiMail | >=6.4.0<=6.4.7 | |
Fortinet FortiMail | >=7.0.0<=7.0.5 | |
Fortinet FortiMail | =7.2.0 | |
Fortinet FortiMail | =7.2.1 | |
Fortinet FortiMail | =7.2.2 |
Please upgrade to FortiMail version 7.4.0 or above Please upgrade to FortiMail version 7.2.3 or above Please upgrade to FortiMail version 7.0.6 or above Please upgrade to FortiMail version 6.4.8 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID is CVE-2023-36556.
The severity of CVE-2023-36556 is high with a CVSS score of 8.8.
FortiMail webmail version 7.2.0 through 7.2.2, version 7.0.0 through 7.0.5, and versions below 6.4.7 are affected.
An authenticated attacker can exploit CVE-2023-36556 by logging in on other users' accounts from the same web domain via crafted HTTP or HTTPs requests.
Yes, Fortinet has released a fix for CVE-2023-36556. Please refer to the reference link for more information.