A missing cryptographic step in the implementation of the hash digest algorithm in FortiMail 6.4.0 through 6.4.4, and 6.2.0 through 6.2.7 may allow an unauthenticated attacker to tamper with signed URLs by appending further data which allows bypass of signature verification.
References
| Link | Resource |
|---|---|
| https://fortiguard.com/advisory/FG-IR-21-027 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Information
Published : 2021-07-09 12:15
Updated : 2022-07-12 10:42
NVD link : CVE-2021-24020
Mitre link : CVE-2021-24020
JSON object : View
CWE
CWE-347
Improper Verification of Cryptographic Signature
Products Affected
fortinet
- fortimail


