fkie_cve-2017-7732
Vulnerability from fkie_nvd
Published
2017-10-26 13:29
Modified
2025-04-20 01:37
Severity ?
Summary
A reflected Cross-Site Scripting (XSS) vulnerability in Fortinet FortiMail 5.1 and earlier, 5.2.0 through 5.2.9, and 5.3.0 through 5.3.9 customized pre-authentication webmail login page allows attacker to inject arbitrary web script or HTML via crafted HTTP requests.
References
| URL | Tags | ||
|---|---|---|---|
| psirt@fortinet.com | http://www.securityfocus.com/bid/101278 | Third Party Advisory, VDB Entry | |
| psirt@fortinet.com | http://www.securitytracker.com/id/1039584 | Third Party Advisory, VDB Entry | |
| psirt@fortinet.com | https://fortiguard.com/psirt/FG-IR-17-099 | Vendor Advisory | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securityfocus.com/bid/101278 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | http://www.securitytracker.com/id/1039584 | Third Party Advisory, VDB Entry | |
| af854a3a-2127-422b-91ae-364da2661108 | https://fortiguard.com/psirt/FG-IR-17-099 | Vendor Advisory |
Impacted products
| Vendor | Product | Version | |
|---|---|---|---|
| fortinet | fortimail | 4.1.0 | |
| fortinet | fortimail | 4.2.0 | |
| fortinet | fortimail | 4.3.0 | |
| fortinet | fortimail | 4.3.8 | |
| fortinet | fortimail | 5.0 | |
| fortinet | fortimail | 5.0.1 | |
| fortinet | fortimail | 5.0.2 | |
| fortinet | fortimail | 5.0.3 | |
| fortinet | fortimail | 5.0.4 | |
| fortinet | fortimail | 5.0.5 | |
| fortinet | fortimail | 5.0.6 | |
| fortinet | fortimail | 5.0.7 | |
| fortinet | fortimail | 5.0.8 | |
| fortinet | fortimail | 5.0.9 | |
| fortinet | fortimail | 5.0.10 | |
| fortinet | fortimail | 5.1 | |
| fortinet | fortimail | 5.2 | |
| fortinet | fortimail | 5.2.1 | |
| fortinet | fortimail | 5.2.2 | |
| fortinet | fortimail | 5.2.3 | |
| fortinet | fortimail | 5.2.4 | |
| fortinet | fortimail | 5.2.5 | |
| fortinet | fortimail | 5.2.6 | |
| fortinet | fortimail | 5.2.7 | |
| fortinet | fortimail | 5.2.8 | |
| fortinet | fortimail | 5.2.9 | |
| fortinet | fortimail | 5.3 | |
| fortinet | fortimail | 5.3.1 | |
| fortinet | fortimail | 5.3.2 | |
| fortinet | fortimail | 5.3.3 | |
| fortinet | fortimail | 5.3.4 | |
| fortinet | fortimail | 5.3.5 | |
| fortinet | fortimail | 5.3.6 | |
| fortinet | fortimail | 5.3.7 | |
| fortinet | fortimail | 5.3.8 | |
| fortinet | fortimail | 5.3.9 |
{
"configurations": [
{
"nodes": [
{
"cpeMatch": [
{
"criteria": "cpe:2.3:a:fortinet:fortimail:4.1.0:*:*:*:*:*:*:*",
"matchCriteriaId": "2822C6B9-7FD5-4E1B-907B-F324F28A82A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:4.2.0:*:*:*:*:*:*:*",
"matchCriteriaId": "9DB89536-8E1E-4E83-9DFA-C9BFF8B310C1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:4.3.0:*:*:*:*:*:*:*",
"matchCriteriaId": "178BB7DA-C703-40E7-8070-D2D001700585",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:4.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "8102D2F0-A12F-4B02-B48A-D7C0790DD3D7",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0:*:*:*:*:*:*:*",
"matchCriteriaId": "EFA17336-50C1-404F-92E4-8107CFAB4D7F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.1:*:*:*:*:*:*:*",
"matchCriteriaId": "B2E85921-4280-44AE-8A94-1158620E9728",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.2:*:*:*:*:*:*:*",
"matchCriteriaId": "9B65F87F-6896-4DC5-99CC-C900E37ADDAA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.3:*:*:*:*:*:*:*",
"matchCriteriaId": "7A59FA3B-CF8B-4088-A27F-C4939873E552",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.4:*:*:*:*:*:*:*",
"matchCriteriaId": "C28A60D9-64F5-4DF2-B0FE-3AA4CCD85D13",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.5:*:*:*:*:*:*:*",
"matchCriteriaId": "6386E32B-365F-4DC8-AA77-14579BB84CB6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6A7FD9C8-F970-4949-B497-01FB3C1A2C40",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.7:*:*:*:*:*:*:*",
"matchCriteriaId": "90956836-650E-45B3-8BFE-46AD5FBC484E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.8:*:*:*:*:*:*:*",
"matchCriteriaId": "2B901768-B13B-456F-9909-E19103A5CAF6",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.9:*:*:*:*:*:*:*",
"matchCriteriaId": "D819B2A1-0A5C-45E7-A4B6-395670EFE0A3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.10:*:*:*:*:*:*:*",
"matchCriteriaId": "EC9DB8EF-E990-429A-839C-9E178DA92A1F",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.1:*:*:*:*:*:*:*",
"matchCriteriaId": "3E5B9F82-F87C-47E1-AA75-1B7F001CC7CA",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2:*:*:*:*:*:*:*",
"matchCriteriaId": "5F946FB0-E890-41C3-BFDC-D7734CE3DDF3",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.1:*:*:*:*:*:*:*",
"matchCriteriaId": "CE2C95E3-0E29-49D9-A9ED-657BC2B05CCC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.2:*:*:*:*:*:*:*",
"matchCriteriaId": "73CF2645-2997-4939-B9C0-D7A42ECAFEEC",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.3:*:*:*:*:*:*:*",
"matchCriteriaId": "0B4D9FF8-64D0-4EF3-A165-C86A68B36BE5",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.4:*:*:*:*:*:*:*",
"matchCriteriaId": "1A6699A9-6EBD-42B9-87E8-AF4D3A124679",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.5:*:*:*:*:*:*:*",
"matchCriteriaId": "1AF5984C-2DD3-486F-96F3-B248B4ED0D7C",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.6:*:*:*:*:*:*:*",
"matchCriteriaId": "CED77E9D-0865-4BCE-B28B-222971AD198A",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.7:*:*:*:*:*:*:*",
"matchCriteriaId": "5A21B130-63A1-459B-A726-B47643A02AA2",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.8:*:*:*:*:*:*:*",
"matchCriteriaId": "1F85C06C-2EFE-404B-9DB0-A9FC3B307BCE",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.9:*:*:*:*:*:*:*",
"matchCriteriaId": "7B3885FE-A0FE-4204-A7C3-2E339B430D59",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3:*:*:*:*:*:*:*",
"matchCriteriaId": "21E004F2-4B2D-4BB7-9B37-CB4E00B7EA88",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.1:*:*:*:*:*:*:*",
"matchCriteriaId": "0B586E3F-520C-4842-A18C-C2F44E747569",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.2:*:*:*:*:*:*:*",
"matchCriteriaId": "0CD12406-E31F-416E-B65A-1486B5E9F86E",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.3:*:*:*:*:*:*:*",
"matchCriteriaId": "F1EF9338-DEB2-4F15-B26B-48B3D7D08659",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.4:*:*:*:*:*:*:*",
"matchCriteriaId": "5421E516-3C05-409F-B6D8-6215223EBB15",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.5:*:*:*:*:*:*:*",
"matchCriteriaId": "39660F44-9613-496D-BA2B-1FFAB528B6DD",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.6:*:*:*:*:*:*:*",
"matchCriteriaId": "6909D1FB-6E23-4CE6-BA70-F2109ACACCD0",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.7:*:*:*:*:*:*:*",
"matchCriteriaId": "1A724687-46DC-4CE3-A11E-45D504C97907",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.8:*:*:*:*:*:*:*",
"matchCriteriaId": "F2A7E80F-DA0D-4A6B-937E-292E02611FE1",
"vulnerable": true
},
{
"criteria": "cpe:2.3:a:fortinet:fortimail:5.3.9:*:*:*:*:*:*:*",
"matchCriteriaId": "79A50BAA-4DAC-4435-89D1-F213EE1BA65F",
"vulnerable": true
}
],
"negate": false,
"operator": "OR"
}
]
}
],
"cveTags": [],
"descriptions": [
{
"lang": "en",
"value": "A reflected Cross-Site Scripting (XSS) vulnerability in Fortinet FortiMail 5.1 and earlier, 5.2.0 through 5.2.9, and 5.3.0 through 5.3.9 customized pre-authentication webmail login page allows attacker to inject arbitrary web script or HTML via crafted HTTP requests."
},
{
"lang": "es",
"value": "Una vulnerabilidad de Cross-Site Scripting (XSS) reflejado en la p\u00e1gina de inicio de sesi\u00f3n preautenticaci\u00f3n al webmail personalizada de Fortinet FortiMail 5.1 y anteriores, desde la versi\u00f3n 5.2.0 hasta la 5.2.9 y la versi\u00f3n 5.3.0 hasta la 5.3.9 permite que un atacante inyecte scripts web o HTML arbitrarios mediante peticiones HTTP manipuladas."
}
],
"id": "CVE-2017-7732",
"lastModified": "2025-04-20T01:37:25.860",
"metrics": {
"cvssMetricV2": [
{
"acInsufInfo": false,
"baseSeverity": "MEDIUM",
"cvssData": {
"accessComplexity": "MEDIUM",
"accessVector": "NETWORK",
"authentication": "NONE",
"availabilityImpact": "NONE",
"baseScore": 4.3,
"confidentialityImpact": "NONE",
"integrityImpact": "PARTIAL",
"vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N",
"version": "2.0"
},
"exploitabilityScore": 8.6,
"impactScore": 2.9,
"obtainAllPrivilege": false,
"obtainOtherPrivilege": false,
"obtainUserPrivilege": false,
"source": "nvd@nist.gov",
"type": "Primary",
"userInteractionRequired": true
}
],
"cvssMetricV30": [
{
"cvssData": {
"attackComplexity": "LOW",
"attackVector": "NETWORK",
"availabilityImpact": "NONE",
"baseScore": 6.1,
"baseSeverity": "MEDIUM",
"confidentialityImpact": "LOW",
"integrityImpact": "LOW",
"privilegesRequired": "NONE",
"scope": "CHANGED",
"userInteraction": "REQUIRED",
"vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N",
"version": "3.0"
},
"exploitabilityScore": 2.8,
"impactScore": 2.7,
"source": "nvd@nist.gov",
"type": "Primary"
}
]
},
"published": "2017-10-26T13:29:00.417",
"references": [
{
"source": "psirt@fortinet.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101278"
},
{
"source": "psirt@fortinet.com",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1039584"
},
{
"source": "psirt@fortinet.com",
"tags": [
"Vendor Advisory"
],
"url": "https://fortiguard.com/psirt/FG-IR-17-099"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securityfocus.com/bid/101278"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Third Party Advisory",
"VDB Entry"
],
"url": "http://www.securitytracker.com/id/1039584"
},
{
"source": "af854a3a-2127-422b-91ae-364da2661108",
"tags": [
"Vendor Advisory"
],
"url": "https://fortiguard.com/psirt/FG-IR-17-099"
}
],
"sourceIdentifier": "psirt@fortinet.com",
"vulnStatus": "Deferred",
"weaknesses": [
{
"description": [
{
"lang": "en",
"value": "CWE-79"
}
],
"source": "nvd@nist.gov",
"type": "Primary"
}
]
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or seen somewhere by the user.
- Confirmed: The vulnerability is confirmed from an analyst perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: This vulnerability was exploited and seen by the user reporting the sighting.
- Patched: This vulnerability was successfully patched by the user reporting the sighting.
- Not exploited: This vulnerability was not exploited or seen by the user reporting the sighting.
- Not confirmed: The user expresses doubt about the veracity of the vulnerability.
- Not patched: This vulnerability was not successfully patched by the user reporting the sighting.
Loading…
Loading…