Fortinet FortiMail WebGUI Cross Site Scripting Vulnerability (FG-IR-15-005)
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
This host is installed with Fortinet FortiMail and is prone to cross site scripting vulnerability.
Insight
Insight
The flaw exists because the 'Web Action Quarantine Release' feature does not validate input before returning it to users.
Affected Software
Affected Software
FortiMail versions 4.3.x before 4.3.9, 5.0.x before 5.0.8, 5.1.x before 5.1.5 and 5.2.x before 5.2.3
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Upgrade to FortiMail version 4.3.9 or 5.0.8 or 5.1.5 or 5.2.3 or later.
Common Vulnerabilities and Exposures (CVE)
Get started for free to scan for vulnerabilities
Companies of all sizes use Mageni to scan their assets for vulnerabilities. Mageni is free for 7-days then $39 monthly regardless of how many IPs, scans, deployments or users you have. Cancel at Anytime and 7-days Money-Back Guarantee. Developed and supported by certified CompTIA PenTest+ professionals. Mageni contributes 1% of your subscription to removing CO₂ from the atmosphere.
Get Started For Free