Vulnerability Details : CVE-2021-36191
A url redirection to untrusted site ('open redirect') in Fortinet FortiWeb version 6.4.1 and below, 6.3.15 and below allows attacker to use the device as proxy via crafted GET parameters in requests to error handlers
Vulnerability category: Open redirect
Products affected by CVE-2021-36191
- cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:*:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:6.4.0:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:6.4.1:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:6.1.0:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:6.1.1:*:*:*:*:*:*:*
- cpe:2.3:a:fortinet:fortiweb:6.1.2:*:*:*:*:*:*:*
Exploit prediction scoring system (EPSS) score for CVE-2021-36191
0.05%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 21 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2021-36191
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
4.9
|
MEDIUM | AV:N/AC:M/Au:S/C:P/I:P/A:N |
6.8
|
4.9
|
NIST | |
5.4
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N |
2.3
|
2.7
|
NIST | |
4.1
|
MEDIUM | CVSS:3.1/AV:N/AC:L/PR:L/UI:R/S:C/C:N/I:L/A:N |
2.3
|
1.4
|
Fortinet, Inc. |
CWE ids for CVE-2021-36191
-
The web application accepts a user-controlled input that specifies a link to an external site, and uses that link in a redirect.Assigned by: nvd@nist.gov (Primary)
References for CVE-2021-36191
-
https://fortiguard.com/advisory/FG-IR-21-133
PSIRT Advisories | FortiGuardPatch;Vendor Advisory
Jump to