CVE-2017-3125 (GCVE-0-2017-3125)
Vulnerability from cvelistv5 – Published: 2017-04-12 15:00 – Updated: 2024-10-25 14:35
VLAI?
Summary
An unauthenticated XSS vulnerability with FortiMail 5.0.0 - 5.2.9 and 5.3.0 - 5.3.8 could allow an attacker to execute arbitrary scripts in the security context of the browser of a victim logged in FortiMail, assuming the victim is social engineered into clicking an URL crafted by the attacker.
Severity ?
No CVSS data available.
CWE
- Information leak
Assigner
References
| URL | Tags | |||||||
|---|---|---|---|---|---|---|---|---|
|
||||||||
Impacted products
{
"containers": {
"adp": [
{
"providerMetadata": {
"dateUpdated": "2024-08-05T14:16:28.219Z",
"orgId": "af854a3a-2127-422b-91ae-364da2661108",
"shortName": "CVE"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM",
"x_transferred"
],
"url": "http://fortiguard.com/psirt/FG-IR-17-011"
},
{
"name": "97474",
"tags": [
"vdb-entry",
"x_refsource_BID",
"x_transferred"
],
"url": "http://www.securityfocus.com/bid/97474"
}
],
"title": "CVE Program Container"
},
{
"metrics": [
{
"other": {
"content": {
"id": "CVE-2017-3125",
"options": [
{
"Exploitation": "none"
},
{
"Automatable": "no"
},
{
"Technical Impact": "partial"
}
],
"role": "CISA Coordinator",
"timestamp": "2024-10-23T14:00:55.634219Z",
"version": "2.0.3"
},
"type": "ssvc"
}
}
],
"providerMetadata": {
"dateUpdated": "2024-10-25T14:35:22.847Z",
"orgId": "134c704f-9b21-4f2e-91b3-4a467353bcc0",
"shortName": "CISA-ADP"
},
"title": "CISA ADP Vulnrichment"
}
],
"cna": {
"affected": [
{
"product": "FortiMail",
"vendor": "Fortinet",
"versions": [
{
"status": "affected",
"version": "5.0.0 -\u003e 5.2.9, 5.3.0 -\u003e 5.3.8"
}
]
}
],
"datePublic": "2017-04-04T00:00:00",
"descriptions": [
{
"lang": "en",
"value": "An unauthenticated XSS vulnerability with FortiMail 5.0.0 - 5.2.9 and 5.3.0 - 5.3.8 could allow an attacker to execute arbitrary scripts in the security context of the browser of a victim logged in FortiMail, assuming the victim is social engineered into clicking an URL crafted by the attacker."
}
],
"problemTypes": [
{
"descriptions": [
{
"description": "Information leak",
"lang": "en",
"type": "text"
}
]
}
],
"providerMetadata": {
"dateUpdated": "2017-04-13T09:57:01",
"orgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
"shortName": "fortinet"
},
"references": [
{
"tags": [
"x_refsource_CONFIRM"
],
"url": "http://fortiguard.com/psirt/FG-IR-17-011"
},
{
"name": "97474",
"tags": [
"vdb-entry",
"x_refsource_BID"
],
"url": "http://www.securityfocus.com/bid/97474"
}
],
"x_legacyV4Record": {
"CVE_data_meta": {
"ASSIGNER": "psirt@fortinet.com",
"ID": "CVE-2017-3125",
"STATE": "PUBLIC"
},
"affects": {
"vendor": {
"vendor_data": [
{
"product": {
"product_data": [
{
"product_name": "FortiMail",
"version": {
"version_data": [
{
"version_value": "5.0.0 -\u003e 5.2.9, 5.3.0 -\u003e 5.3.8"
}
]
}
}
]
},
"vendor_name": "Fortinet"
}
]
}
},
"data_format": "MITRE",
"data_type": "CVE",
"data_version": "4.0",
"description": {
"description_data": [
{
"lang": "eng",
"value": "An unauthenticated XSS vulnerability with FortiMail 5.0.0 - 5.2.9 and 5.3.0 - 5.3.8 could allow an attacker to execute arbitrary scripts in the security context of the browser of a victim logged in FortiMail, assuming the victim is social engineered into clicking an URL crafted by the attacker."
}
]
},
"problemtype": {
"problemtype_data": [
{
"description": [
{
"lang": "eng",
"value": "Information leak"
}
]
}
]
},
"references": {
"reference_data": [
{
"name": "http://fortiguard.com/psirt/FG-IR-17-011",
"refsource": "CONFIRM",
"url": "http://fortiguard.com/psirt/FG-IR-17-011"
},
{
"name": "97474",
"refsource": "BID",
"url": "http://www.securityfocus.com/bid/97474"
}
]
}
}
}
},
"cveMetadata": {
"assignerOrgId": "6abe59d8-c742-4dff-8ce8-9b0ca1073da8",
"assignerShortName": "fortinet",
"cveId": "CVE-2017-3125",
"datePublished": "2017-04-12T15:00:00",
"dateReserved": "2016-12-02T00:00:00",
"dateUpdated": "2024-10-25T14:35:22.847Z",
"state": "PUBLISHED"
},
"dataType": "CVE_RECORD",
"dataVersion": "5.1",
"vulnerability-lookup:meta": {
"fkie_nvd": {
"configurations": "[{\"nodes\": [{\"operator\": \"OR\", \"negate\": false, \"cpeMatch\": [{\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.0:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EFA17336-50C1-404F-92E4-8107CFAB4D7F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.0.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6386E32B-365F-4DC8-AA77-14579BB84CB6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.0.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6A7FD9C8-F970-4949-B497-01FB3C1A2C40\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.0.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"90956836-650E-45B3-8BFE-46AD5FBC484E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.0.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"2B901768-B13B-456F-9909-E19103A5CAF6\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.0.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"D819B2A1-0A5C-45E7-A4B6-395670EFE0A3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.0.10:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"EC9DB8EF-E990-429A-839C-9E178DA92A1F\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"3E5B9F82-F87C-47E1-AA75-1B7F001CC7CA\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.1.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"863EAA3C-B10D-4211-BAD9-1CFA91F820AE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.1.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"24F47A35-CC2A-4908-B678-FACD619EDDE2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.1.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"82039A31-FE0C-4460-B669-9FE766B47D3B\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.1.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"549EE473-3B98-4458-BCA2-D0B14BFFDE37\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5F946FB0-E890-41C3-BFDC-D7734CE3DDF3\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CE2C95E3-0E29-49D9-A9ED-657BC2B05CCC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"73CF2645-2997-4939-B9C0-D7A42ECAFEEC\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B4D9FF8-64D0-4EF3-A165-C86A68B36BE5\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A6699A9-6EBD-42B9-87E8-AF4D3A124679\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1AF5984C-2DD3-486F-96F3-B248B4ED0D7C\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"CED77E9D-0865-4BCE-B28B-222971AD198A\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5A21B130-63A1-459B-A726-B47643A02AA2\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1F85C06C-2EFE-404B-9DB0-A9FC3B307BCE\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.2.9:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"7B3885FE-A0FE-4204-A7C3-2E339B430D59\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"21E004F2-4B2D-4BB7-9B37-CB4E00B7EA88\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3.1:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0B586E3F-520C-4842-A18C-C2F44E747569\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3.2:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"0CD12406-E31F-416E-B65A-1486B5E9F86E\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3.3:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F1EF9338-DEB2-4F15-B26B-48B3D7D08659\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3.4:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"5421E516-3C05-409F-B6D8-6215223EBB15\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3.5:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"39660F44-9613-496D-BA2B-1FFAB528B6DD\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3.6:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"6909D1FB-6E23-4CE6-BA70-F2109ACACCD0\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3.7:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"1A724687-46DC-4CE3-A11E-45D504C97907\"}, {\"vulnerable\": true, \"criteria\": \"cpe:2.3:a:fortinet:fortimail:5.3.8:*:*:*:*:*:*:*\", \"matchCriteriaId\": \"F2A7E80F-DA0D-4A6B-937E-292E02611FE1\"}]}]}]",
"descriptions": "[{\"lang\": \"en\", \"value\": \"An unauthenticated XSS vulnerability with FortiMail 5.0.0 - 5.2.9 and 5.3.0 - 5.3.8 could allow an attacker to execute arbitrary scripts in the security context of the browser of a victim logged in FortiMail, assuming the victim is social engineered into clicking an URL crafted by the attacker.\"}, {\"lang\": \"es\", \"value\": \"Una vulnerabilidad XSS no autenticada con FortiMail 5.0.0 - 5.2.9 y 5.3.0 - 5.3.8 podr\\u00eda permitir a un atacante ejecutar secuencias de comandos arbitrarias en el contexto de seguridad del navegador de una v\\u00edctima registrada en FortiMail, asumiendo que la v\\u00edctima ha sido manipulada mediante ingenier\\u00eda social para hacer clic en una URL manipulada por el atacante.\"}]",
"id": "CVE-2017-3125",
"lastModified": "2024-11-21T03:24:53.030",
"metrics": "{\"cvssMetricV30\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"3.0\", \"vectorString\": \"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\", \"baseScore\": 6.1, \"baseSeverity\": \"MEDIUM\", \"attackVector\": \"NETWORK\", \"attackComplexity\": \"LOW\", \"privilegesRequired\": \"NONE\", \"userInteraction\": \"REQUIRED\", \"scope\": \"CHANGED\", \"confidentialityImpact\": \"LOW\", \"integrityImpact\": \"LOW\", \"availabilityImpact\": \"NONE\"}, \"exploitabilityScore\": 2.8, \"impactScore\": 2.7}], \"cvssMetricV2\": [{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"cvssData\": {\"version\": \"2.0\", \"vectorString\": \"AV:N/AC:M/Au:N/C:N/I:P/A:N\", \"baseScore\": 4.3, \"accessVector\": \"NETWORK\", \"accessComplexity\": \"MEDIUM\", \"authentication\": \"NONE\", \"confidentialityImpact\": \"NONE\", \"integrityImpact\": \"PARTIAL\", \"availabilityImpact\": \"NONE\"}, \"baseSeverity\": \"MEDIUM\", \"exploitabilityScore\": 8.6, \"impactScore\": 2.9, \"acInsufInfo\": false, \"obtainAllPrivilege\": false, \"obtainUserPrivilege\": false, \"obtainOtherPrivilege\": false, \"userInteractionRequired\": true}]}",
"published": "2017-04-12T15:59:00.160",
"references": "[{\"url\": \"http://fortiguard.com/psirt/FG-IR-17-011\", \"source\": \"psirt@fortinet.com\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/97474\", \"source\": \"psirt@fortinet.com\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}, {\"url\": \"http://fortiguard.com/psirt/FG-IR-17-011\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Vendor Advisory\"]}, {\"url\": \"http://www.securityfocus.com/bid/97474\", \"source\": \"af854a3a-2127-422b-91ae-364da2661108\", \"tags\": [\"Third Party Advisory\", \"VDB Entry\"]}]",
"sourceIdentifier": "psirt@fortinet.com",
"vulnStatus": "Modified",
"weaknesses": "[{\"source\": \"nvd@nist.gov\", \"type\": \"Primary\", \"description\": [{\"lang\": \"en\", \"value\": \"CWE-79\"}]}]"
},
"nvd": "{\"cve\":{\"id\":\"CVE-2017-3125\",\"sourceIdentifier\":\"psirt@fortinet.com\",\"published\":\"2017-04-12T15:59:00.160\",\"lastModified\":\"2025-04-20T01:37:25.860\",\"vulnStatus\":\"Deferred\",\"cveTags\":[],\"descriptions\":[{\"lang\":\"en\",\"value\":\"An unauthenticated XSS vulnerability with FortiMail 5.0.0 - 5.2.9 and 5.3.0 - 5.3.8 could allow an attacker to execute arbitrary scripts in the security context of the browser of a victim logged in FortiMail, assuming the victim is social engineered into clicking an URL crafted by the attacker.\"},{\"lang\":\"es\",\"value\":\"Una vulnerabilidad XSS no autenticada con FortiMail 5.0.0 - 5.2.9 y 5.3.0 - 5.3.8 podr\u00eda permitir a un atacante ejecutar secuencias de comandos arbitrarias en el contexto de seguridad del navegador de una v\u00edctima registrada en FortiMail, asumiendo que la v\u00edctima ha sido manipulada mediante ingenier\u00eda social para hacer clic en una URL manipulada por el atacante.\"}],\"metrics\":{\"cvssMetricV30\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"3.0\",\"vectorString\":\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\",\"baseScore\":6.1,\"baseSeverity\":\"MEDIUM\",\"attackVector\":\"NETWORK\",\"attackComplexity\":\"LOW\",\"privilegesRequired\":\"NONE\",\"userInteraction\":\"REQUIRED\",\"scope\":\"CHANGED\",\"confidentialityImpact\":\"LOW\",\"integrityImpact\":\"LOW\",\"availabilityImpact\":\"NONE\"},\"exploitabilityScore\":2.8,\"impactScore\":2.7}],\"cvssMetricV2\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"cvssData\":{\"version\":\"2.0\",\"vectorString\":\"AV:N/AC:M/Au:N/C:N/I:P/A:N\",\"baseScore\":4.3,\"accessVector\":\"NETWORK\",\"accessComplexity\":\"MEDIUM\",\"authentication\":\"NONE\",\"confidentialityImpact\":\"NONE\",\"integrityImpact\":\"PARTIAL\",\"availabilityImpact\":\"NONE\"},\"baseSeverity\":\"MEDIUM\",\"exploitabilityScore\":8.6,\"impactScore\":2.9,\"acInsufInfo\":false,\"obtainAllPrivilege\":false,\"obtainUserPrivilege\":false,\"obtainOtherPrivilege\":false,\"userInteractionRequired\":true}]},\"weaknesses\":[{\"source\":\"nvd@nist.gov\",\"type\":\"Primary\",\"description\":[{\"lang\":\"en\",\"value\":\"CWE-79\"}]}],\"configurations\":[{\"nodes\":[{\"operator\":\"OR\",\"negate\":false,\"cpeMatch\":[{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.0:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EFA17336-50C1-404F-92E4-8107CFAB4D7F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.0.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6386E32B-365F-4DC8-AA77-14579BB84CB6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.0.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6A7FD9C8-F970-4949-B497-01FB3C1A2C40\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.0.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"90956836-650E-45B3-8BFE-46AD5FBC484E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.0.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"2B901768-B13B-456F-9909-E19103A5CAF6\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.0.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"D819B2A1-0A5C-45E7-A4B6-395670EFE0A3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.0.10:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"EC9DB8EF-E990-429A-839C-9E178DA92A1F\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"3E5B9F82-F87C-47E1-AA75-1B7F001CC7CA\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.1.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"863EAA3C-B10D-4211-BAD9-1CFA91F820AE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.1.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"24F47A35-CC2A-4908-B678-FACD619EDDE2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.1.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"82039A31-FE0C-4460-B669-9FE766B47D3B\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.1.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"549EE473-3B98-4458-BCA2-D0B14BFFDE37\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5F946FB0-E890-41C3-BFDC-D7734CE3DDF3\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CE2C95E3-0E29-49D9-A9ED-657BC2B05CCC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"73CF2645-2997-4939-B9C0-D7A42ECAFEEC\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B4D9FF8-64D0-4EF3-A165-C86A68B36BE5\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A6699A9-6EBD-42B9-87E8-AF4D3A124679\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1AF5984C-2DD3-486F-96F3-B248B4ED0D7C\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"CED77E9D-0865-4BCE-B28B-222971AD198A\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5A21B130-63A1-459B-A726-B47643A02AA2\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1F85C06C-2EFE-404B-9DB0-A9FC3B307BCE\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.2.9:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"7B3885FE-A0FE-4204-A7C3-2E339B430D59\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"21E004F2-4B2D-4BB7-9B37-CB4E00B7EA88\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3.1:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0B586E3F-520C-4842-A18C-C2F44E747569\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3.2:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"0CD12406-E31F-416E-B65A-1486B5E9F86E\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3.3:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F1EF9338-DEB2-4F15-B26B-48B3D7D08659\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3.4:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"5421E516-3C05-409F-B6D8-6215223EBB15\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3.5:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"39660F44-9613-496D-BA2B-1FFAB528B6DD\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3.6:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"6909D1FB-6E23-4CE6-BA70-F2109ACACCD0\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3.7:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"1A724687-46DC-4CE3-A11E-45D504C97907\"},{\"vulnerable\":true,\"criteria\":\"cpe:2.3:a:fortinet:fortimail:5.3.8:*:*:*:*:*:*:*\",\"matchCriteriaId\":\"F2A7E80F-DA0D-4A6B-937E-292E02611FE1\"}]}]}],\"references\":[{\"url\":\"http://fortiguard.com/psirt/FG-IR-17-011\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97474\",\"source\":\"psirt@fortinet.com\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]},{\"url\":\"http://fortiguard.com/psirt/FG-IR-17-011\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Vendor Advisory\"]},{\"url\":\"http://www.securityfocus.com/bid/97474\",\"source\":\"af854a3a-2127-422b-91ae-364da2661108\",\"tags\":[\"Third Party Advisory\",\"VDB Entry\"]}]}}",
"vulnrichment": {
"containers": "{\"adp\": [{\"title\": \"CVE Program Container\", \"references\": [{\"url\": \"http://fortiguard.com/psirt/FG-IR-17-011\", \"tags\": [\"x_refsource_CONFIRM\", \"x_transferred\"]}, {\"url\": \"http://www.securityfocus.com/bid/97474\", \"name\": \"97474\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\", \"x_transferred\"]}], \"providerMetadata\": {\"orgId\": \"af854a3a-2127-422b-91ae-364da2661108\", \"shortName\": \"CVE\", \"dateUpdated\": \"2024-08-05T14:16:28.219Z\"}}, {\"title\": \"CISA ADP Vulnrichment\", \"metrics\": [{\"other\": {\"type\": \"ssvc\", \"content\": {\"id\": \"CVE-2017-3125\", \"role\": \"CISA Coordinator\", \"options\": [{\"Exploitation\": \"none\"}, {\"Automatable\": \"no\"}, {\"Technical Impact\": \"partial\"}], \"version\": \"2.0.3\", \"timestamp\": \"2024-10-23T14:00:55.634219Z\"}}}], \"providerMetadata\": {\"orgId\": \"134c704f-9b21-4f2e-91b3-4a467353bcc0\", \"shortName\": \"CISA-ADP\", \"dateUpdated\": \"2024-10-23T14:02:04.756Z\"}}], \"cna\": {\"affected\": [{\"vendor\": \"Fortinet\", \"product\": \"FortiMail\", \"versions\": [{\"status\": \"affected\", \"version\": \"5.0.0 -\u003e 5.2.9, 5.3.0 -\u003e 5.3.8\"}]}], \"datePublic\": \"2017-04-04T00:00:00\", \"references\": [{\"url\": \"http://fortiguard.com/psirt/FG-IR-17-011\", \"tags\": [\"x_refsource_CONFIRM\"]}, {\"url\": \"http://www.securityfocus.com/bid/97474\", \"name\": \"97474\", \"tags\": [\"vdb-entry\", \"x_refsource_BID\"]}], \"descriptions\": [{\"lang\": \"en\", \"value\": \"An unauthenticated XSS vulnerability with FortiMail 5.0.0 - 5.2.9 and 5.3.0 - 5.3.8 could allow an attacker to execute arbitrary scripts in the security context of the browser of a victim logged in FortiMail, assuming the victim is social engineered into clicking an URL crafted by the attacker.\"}], \"problemTypes\": [{\"descriptions\": [{\"lang\": \"en\", \"type\": \"text\", \"description\": \"Information leak\"}]}], \"providerMetadata\": {\"orgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"shortName\": \"fortinet\", \"dateUpdated\": \"2017-04-13T09:57:01\"}, \"x_legacyV4Record\": {\"affects\": {\"vendor\": {\"vendor_data\": [{\"product\": {\"product_data\": [{\"version\": {\"version_data\": [{\"version_value\": \"5.0.0 -\u003e 5.2.9, 5.3.0 -\u003e 5.3.8\"}]}, \"product_name\": \"FortiMail\"}]}, \"vendor_name\": \"Fortinet\"}]}}, \"data_type\": \"CVE\", \"references\": {\"reference_data\": [{\"url\": \"http://fortiguard.com/psirt/FG-IR-17-011\", \"name\": \"http://fortiguard.com/psirt/FG-IR-17-011\", \"refsource\": \"CONFIRM\"}, {\"url\": \"http://www.securityfocus.com/bid/97474\", \"name\": \"97474\", \"refsource\": \"BID\"}]}, \"data_format\": \"MITRE\", \"description\": {\"description_data\": [{\"lang\": \"eng\", \"value\": \"An unauthenticated XSS vulnerability with FortiMail 5.0.0 - 5.2.9 and 5.3.0 - 5.3.8 could allow an attacker to execute arbitrary scripts in the security context of the browser of a victim logged in FortiMail, assuming the victim is social engineered into clicking an URL crafted by the attacker.\"}]}, \"problemtype\": {\"problemtype_data\": [{\"description\": [{\"lang\": \"eng\", \"value\": \"Information leak\"}]}]}, \"data_version\": \"4.0\", \"CVE_data_meta\": {\"ID\": \"CVE-2017-3125\", \"STATE\": \"PUBLIC\", \"ASSIGNER\": \"psirt@fortinet.com\"}}}}",
"cveMetadata": "{\"cveId\": \"CVE-2017-3125\", \"state\": \"PUBLISHED\", \"dateUpdated\": \"2024-10-25T14:35:22.847Z\", \"dateReserved\": \"2016-12-02T00:00:00\", \"assignerOrgId\": \"6abe59d8-c742-4dff-8ce8-9b0ca1073da8\", \"datePublished\": \"2017-04-12T15:00:00\", \"assignerShortName\": \"fortinet\"}",
"dataType": "CVE_RECORD",
"dataVersion": "5.1"
}
}
}
Loading…
Loading…
Sightings
| Author | Source | Type | Date |
|---|
Nomenclature
- Seen: The vulnerability was mentioned, discussed, or observed by the user.
- Confirmed: The vulnerability has been validated from an analyst's perspective.
- Published Proof of Concept: A public proof of concept is available for this vulnerability.
- Exploited: The vulnerability was observed as exploited by the user who reported the sighting.
- Patched: The vulnerability was observed as successfully patched by the user who reported the sighting.
- Not exploited: The vulnerability was not observed as exploited by the user who reported the sighting.
- Not confirmed: The user expressed doubt about the validity of the vulnerability.
- Not patched: The vulnerability was not observed as successfully patched by the user who reported the sighting.
Loading…
Loading…