A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-027 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-07-09 12:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-24020
Mitre link : CVE-2021-24020
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
fortinet
- fortimail