2021-01-13 22:02:39 +00:00
{
"data_type" : "CVE" ,
"data_format" : "MITRE" ,
"data_version" : "4.0" ,
"CVE_data_meta" : {
"ID" : "CVE-2021-24020" ,
2021-07-09 16:30:06 +02:00
"ASSIGNER" : "psirt@fortinet.com" ,
"STATE" : "PUBLIC"
} ,
"affects" : {
"vendor" : {
"vendor_data" : [
{
"vendor_name" : "Fortinet" ,
"product" : {
"product_data" : [
{
"product_name" : "Fortinet FortiMail" ,
"version" : {
"version_data" : [
{
"version_value" : "FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7"
}
]
}
}
]
}
}
]
}
} ,
"impact" : {
"cvss" : {
"attackComplexity" : "High" ,
"attackVector" : "Network" ,
"availabilityImpact" : "High" ,
"baseScore" : 6.9 ,
"baseSeverity" : "Medium" ,
"confidentialityImpact" : "High" ,
"integrityImpact" : "High" ,
"privilegesRequired" : "Low" ,
"scope" : "Unchanged" ,
"userInteraction" : "None" ,
"vectorString" : "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H" ,
"version" : "3.1"
}
} ,
"problemtype" : {
"problemtype_data" : [
{
"description" : [
{
"lang" : "eng" ,
"value" : "Improper Access Control"
}
]
}
]
} ,
"references" : {
"reference_data" : [
{
"refsource" : "CONFIRM" ,
"name" : "https://fortiguard.com/advisory/FG-IR-21-027" ,
"url" : "https://fortiguard.com/advisory/FG-IR-21-027"
}
]
2021-01-13 22:02:39 +00:00
} ,
"description" : {
"description_data" : [
{
"lang" : "eng" ,
2021-07-09 16:30:06 +02:00
"value" : "A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows\u00a0bypass of signature\u00a0verification."
2021-01-13 22:02:39 +00:00
}
]
}
}