From 28a5f9df3db5d1b1b6eb3c5b97b80d68b09e407d Mon Sep 17 00:00:00 2001 From: Fortinet PSIRT Team Date: Fri, 9 Jul 2021 16:30:06 +0200 Subject: [PATCH] Commit CVE-2021-24020 --- 2021/24xxx/CVE-2021-24020.json | 66 ++++++++++++++++++++++++++++++++-- 1 file changed, 63 insertions(+), 3 deletions(-) diff --git a/2021/24xxx/CVE-2021-24020.json b/2021/24xxx/CVE-2021-24020.json index 5e7d0cb22f5..a73df52b7f2 100644 --- a/2021/24xxx/CVE-2021-24020.json +++ b/2021/24xxx/CVE-2021-24020.json @@ -4,14 +4,74 @@ "data_version": "4.0", "CVE_data_meta": { "ID": "CVE-2021-24020", - "ASSIGNER": "cve@mitre.org", - "STATE": "RESERVED" + "ASSIGNER": "psirt@fortinet.com", + "STATE": "PUBLIC" + }, + "affects": { + "vendor": { + "vendor_data": [ + { + "vendor_name": "Fortinet", + "product": { + "product_data": [ + { + "product_name": "Fortinet FortiMail", + "version": { + "version_data": [ + { + "version_value": "FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7" + } + ] + } + } + ] + } + } + ] + } + }, + "impact": { + "cvss": { + "attackComplexity": "High", + "attackVector": "Network", + "availabilityImpact": "High", + "baseScore": 6.9, + "baseSeverity": "Medium", + "confidentialityImpact": "High", + "integrityImpact": "High", + "privilegesRequired": "Low", + "scope": "Unchanged", + "userInteraction": "None", + "vectorString": "CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H", + "version": "3.1" + } + }, + "problemtype": { + "problemtype_data": [ + { + "description": [ + { + "lang": "eng", + "value": "Improper Access Control" + } + ] + } + ] + }, + "references": { + "reference_data": [ + { + "refsource": "CONFIRM", + "name": "https://fortiguard.com/advisory/FG-IR-21-027", + "url": "https://fortiguard.com/advisory/FG-IR-21-027" + } + ] }, "description": { "description_data": [ { "lang": "eng", - "value": "** RESERVED ** This candidate has been reserved by an organization or individual that will use it when announcing a new security problem. When the candidate has been publicized, the details for this candidate will be provided." + "value": "A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows\u00a0bypass of signature\u00a0verification." } ] }