<?xml version="1.0" encoding="UTF-8"?>
<cvrf:cvrfdoc xmlns:xsi="http://www.w3.org/2001/XMLSchema-instance" xmlns:xsd="http://www.w3.org/2001/XMLSchema" xmlns:cvrf-common="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/common" xmlns:cvrf="http://docs.oasis-open.org/csaf/ns/csaf-cvrf/v1.2/cvrf">
    <cvrf:DocumentTitle>Path traversal vulnerabilities</cvrf:DocumentTitle>
    <cvrf:DocumentType>Fortinet PSIRT Advisories</cvrf:DocumentType>
    <cvrf:DocumentPublisher Type="Vendor">
        <cvrf:ContactDetails>
            Fortinet PSIRT Contact:
            Website: https://fortiguard.fortinet.com/faq/psirt-contact
        </cvrf:ContactDetails>
     </cvrf:DocumentPublisher>
    <cvrf:DocumentTracking>
        <cvrf:Identification>
            <cvrf:ID>FG-IR-21-014</cvrf:ID>
        </cvrf:Identification>
        <cvrf:Status>Final</cvrf:Status>
        <cvrf:Version>1</cvrf:Version>
        <cvrf:RevisionHistory>
            <cvrf:Revision>
                <cvrf:Number>1</cvrf:Number>
                <cvrf:Date>2021-07-07T00:00:00</cvrf:Date>
                <cvrf:Description>Current version</cvrf:Description>
        </cvrf:Revision>
       </cvrf:RevisionHistory>
        <cvrf:InitialReleaseDate>2021-07-07T00:00:00</cvrf:InitialReleaseDate>
        <cvrf:CurrentReleaseDate>2021-07-07T00:00:00</cvrf:CurrentReleaseDate>
    </cvrf:DocumentTracking>
    <cvrf:DocumentNotes>
        <cvrf:Note Title="Summary" Type="Summary" Ordinal="1">
            Multiple Path traversal vulnerabilities in FortiMail, FortiNDR &amp; FortiWeb may allow a regular user to obtain unauthorized access to files and data via specifically crafted web requests.
        </cvrf:Note>
        <cvrf:Note Title="Impact" Type="General" Ordinal="2">
            Improper access control
        </cvrf:Note>
        <cvrf:Note Title="Affected Products" Type="General" Ordinal="3">
            FortiMail 6.4.3 and below.FortiMail 6.2.6 and below.FortiMail 6.0.10 and below.FortiMail 5.4.12 and below.At leastFortiWeb version 5.9.0 through 5.9.2FortiWeb version 6.0.0 through 6.0.8FortiWeb version 6.1.0 through 6.1.3FortiWeb version 6.2.0 through 6.2.7FortiWeb version 6.3.0 through 6.3.17FortiWeb version 6.4.0 through 6.4.2FortiWeb version 7.0.0FortiNDR version 1.1.0FortiNDR version 1.2.0FortiNDR version 1.3.0 through 1.3.1FortiNDR version 1.4.0FortiNDR version 1.5.0 through 1.5.3
        </cvrf:Note>
        <cvrf:Note Title="Solutions" Type="General" Ordinal="4">
            Upgrade to FortiMail version 7.0.0 or above,Upgrade to FortiMail version 6.4.4 or above,Upgrade to FortiMail version 6.2.7 or above.Upgrade to FortiMail version 6.0.11 or above.Upgrade to FortiNDR version 7.0.0 or above.Please upgrade to FortiWeb version 7.0.1 or above,Please upgrade to FortiWeb version 6.4.3 or above,Please upgrade to FortiWeb version 6.3.18 or above.
        </cvrf:Note>
    </cvrf:DocumentNotes>
    <cvrf:Acknowledgments>
        <cvrf:Acknowledgment>
            <cvrf:Description>This issue was discovered by Giuseppe Cocomazzi of the Fortinet PSIRT Team during an internal security assessment.</cvrf:Description>
        </cvrf:Acknowledgment>
    </cvrf:Acknowledgments>
    <Vulnerability Ordinal="1">
        <Title>Path traversal vulnerabilities</Title>
        <cvrf:CVE>CVE-2021-24013</cvrf:CVE>
        <CVSSScoreSets>
            <ScoreSetV3>
                <BaseScoreV3>6.8</BaseScoreV3>
                <VectorV3>CVSS:3.1/AV:N/AC:L/PR:H/UI:N/S:U/C:H/I:H/A:H/E:P/RL:X/RC:C</VectorV3>
            </ScoreSetV3>
        </CVSSScoreSets>
        <References Type="Self">
            <Reference>
                <URL>https://fortiguard.fortinet.com/psirt/FG-IR-21-014</URL>
                <Description>Path traversal vulnerabilities</Description>
            </Reference>Reference>
        </References>
    </Vulnerability>
</cvrf:cvrfdoc>