A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-027 | Vendor Advisory |
https://fortiguard.com/advisory/FG-IR-21-027 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
21 Nov 2024, 05:52
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : 7.5
v3 : 7.5 |
References | () https://fortiguard.com/advisory/FG-IR-21-027 - Vendor Advisory |
Information
Published : 2021-07-09 19:15
Updated : 2024-11-21 05:52
NVD link : CVE-2021-24020
Mitre link : CVE-2021-24020
CVE.ORG link : CVE-2021-24020
JSON object : View
Products Affected
fortinet
- fortimail
CWE
CWE-347
Improper Verification of Cryptographic Signature