First published: Tue Oct 10 2023(Updated: )
An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiMail version 7.2.0 through 7.2.2 and before 7.0.5 allows an authenticated attacker to inject HTML tags in FortiMail's calendar via input fields.
Credit: psirt@fortinet.com psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiMail | >=7.0.1<=7.0.5 | |
Fortinet FortiMail | =7.2.0 | |
Fortinet FortiMail | =7.2.1 | |
Fortinet FortiMail | =7.2.2 |
Please upgrade to FortiMail version 7.4.0 or above Please upgrade to FortiMail version 7.2.3 or above Please upgrade to FortiMail version 7.0.6 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The severity of CVE-2023-36637 is medium with a CVSS score of 5.4.
CVE-2023-36637 affects FortiMail versions 7.2.0 through 7.2.2 and before 7.0.5.
CVE-2023-36637 belongs to the CWE-79 category.
An authenticated attacker can exploit CVE-2023-36637 by injecting HTML tags in FortiMail's calendar via input fields.
A fix for CVE-2023-36637 is available in FortiMail version 7.0.5 and later.