CVE-2021-24020

A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*

History

21 Nov 2024, 05:52

Type Values Removed Values Added
CVSS v2 : 7.5
v3 : 9.8
v2 : 7.5
v3 : 7.5
References () https://fortiguard.com/advisory/FG-IR-21-027 - Vendor Advisory () https://fortiguard.com/advisory/FG-IR-21-027 - Vendor Advisory

Information

Published : 2021-07-09 19:15

Updated : 2024-11-21 05:52


NVD link : CVE-2021-24020

Mitre link : CVE-2021-24020

CVE.ORG link : CVE-2021-24020


JSON object : View

Products Affected

fortinet

  • fortimail
CWE
CWE-347

Improper Verification of Cryptographic Signature