Lucene search

K
cvelistFortinetCVELIST:CVE-2023-36637
HistoryOct 10, 2023 - 4:50 p.m.

CVE-2023-36637

2023-10-1016:50:16
CWE-79
fortinet
www.cve.org
3
improper input neutralization
web page generation
fortimail
calendar injection
authenticated attacker

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:F/RC:C

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

18.6%

An improper neutralization of input during web page generation vulnerability [CWE-79] in FortiMail version 7.2.0 through 7.2.2 and before 7.0.5 allows an authenticated attacker to inject HTML tags in FortiMail’s calendar via input fields.

CNA Affected

[
  {
    "vendor": "Fortinet",
    "product": "FortiMail",
    "defaultStatus": "unaffected",
    "versions": [
      {
        "versionType": "semver",
        "version": "7.2.0",
        "lessThanOrEqual": "7.2.2",
        "status": "affected"
      },
      {
        "versionType": "semver",
        "version": "7.0.1",
        "lessThanOrEqual": "7.0.5",
        "status": "affected"
      }
    ]
  }
]

CVSS3

3.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:U/C:N/I:L/A:N/E:F/RC:C

AI Score

5.6

Confidence

High

EPSS

0.001

Percentile

18.6%

Related for CVELIST:CVE-2023-36637