Lucene search

K
cveFortinetCVE-2023-36637
HistoryOct 10, 2023 - 5:15 p.m.

CVE-2023-36637

2023-10-1017:15:12
CWE-79
fortinet
web.nvd.nist.gov
13
cve-2023-36637
fortimail
cwe-79
web page generation
input neutralization
html injection

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

18.6%

An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiMail version 7.2.0 through 7.2.2 and before 7.0.5 allows an authenticated attacker to inject HTML tags in FortiMail’s calendar via input fields.

Affected configurations

Nvd
Node
fortinetfortimailRange7.0.17.0.5
OR
fortinetfortimailMatch7.2.0
OR
fortinetfortimailMatch7.2.1
OR
fortinetfortimailMatch7.2.2
VendorProductVersionCPE
fortinetfortimail*cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
fortinetfortimail7.2.0cpe:2.3:a:fortinet:fortimail:7.2.0:*:*:*:*:*:*:*
fortinetfortimail7.2.1cpe:2.3:a:fortinet:fortimail:7.2.1:*:*:*:*:*:*:*
fortinetfortimail7.2.2cpe:2.3:a:fortinet:fortimail:7.2.2:*:*:*:*:*:*:*

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiMail",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.1",
        "lessThanOrEqual": "7.0.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

5.4

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

CHANGED

Confidentiality Impact

LOW

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N

AI Score

5.3

Confidence

High

EPSS

0.001

Percentile

18.6%

Related for CVE-2023-36637