Show plain JSON{"id": "CVE-2014-8617", "cveTags": [], "metrics": {"cvssMetricV2": [{"type": "Primary", "source": "nvd@nist.gov", "cvssData": {"version": "2.0", "baseScore": 4.3, "accessVector": "NETWORK", "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "authentication": "NONE", "integrityImpact": "PARTIAL", "accessComplexity": "MEDIUM", "availabilityImpact": "NONE", "confidentialityImpact": "NONE"}, "acInsufInfo": false, "impactScore": 2.9, "baseSeverity": "MEDIUM", "obtainAllPrivilege": false, "exploitabilityScore": 8.6, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": true}]}, "published": "2015-03-04T19:59:00.047", "references": [{"url": "http://seclists.org/fulldisclosure/2015/Mar/5", "tags": ["Exploit"], "source": "cve@mitre.org"}, {"url": "http://www.fortiguard.com/advisory/FG-IR-15-005/", "tags": ["Vendor Advisory"], "source": "cve@mitre.org"}, {"url": "http://www.securitytracker.com/id/1031859", "source": "cve@mitre.org"}, {"url": "http://seclists.org/fulldisclosure/2015/Mar/5", "tags": ["Exploit"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.fortiguard.com/advisory/FG-IR-15-005/", "tags": ["Vendor Advisory"], "source": "af854a3a-2127-422b-91ae-364da2661108"}, {"url": "http://www.securitytracker.com/id/1031859", "source": "af854a3a-2127-422b-91ae-364da2661108"}], "vulnStatus": "Deferred", "weaknesses": [{"type": "Primary", "source": "nvd@nist.gov", "description": [{"lang": "en", "value": "CWE-79"}]}], "descriptions": [{"lang": "en", "value": "Cross-site scripting (XSS) vulnerability in the Web Action Quarantine Release feature in the WebGUI in Fortinet FortiMail before 4.3.9, 5.0.x before 5.0.8, 5.1.x before 5.1.5, and 5.2.x before 5.2.3 allows remote attackers to inject arbitrary web script or HTML via the release parameter to module/releasecontrol."}, {"lang": "es", "value": "Vulnerabilidad de XSS en la caracter\u00edstica Web Action Quarantine Release en la interfaz gr\u00e1fica del usuario Web en Fortinet FortiMail anterior a 4.3.9, 5.0.x anterior a 5.0.8, 5.1.x anterior a 5.1.5, y 5.2.x anterior a 5.2.3 permite a atacantes remotos inyectar secuencias de comandos web arbitrarios o HTML arbitrarios a trav\u00e9s del par\u00e1metro release en module/releasecontrol."}], "lastModified": "2025-04-12T10:46:40.837", "configurations": [{"nodes": [{"negate": false, "cpeMatch": [{"criteria": "cpe:2.3:a:fortinet:fortimail:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6B92E540-CF6A-4996-AE8A-EFEA735B6D00", "versionEndIncluding": "4.3.8"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.0:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "EFA17336-50C1-404F-92E4-8107CFAB4D7F"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "B2E85921-4280-44AE-8A94-1158620E9728"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "9B65F87F-6896-4DC5-99CC-C900E37ADDAA"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7A59FA3B-CF8B-4088-A27F-C4939873E552"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "C28A60D9-64F5-4DF2-B0FE-3AA4CCD85D13"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.5:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6386E32B-365F-4DC8-AA77-14579BB84CB6"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.6:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "6A7FD9C8-F970-4949-B497-01FB3C1A2C40"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.0.7:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "90956836-650E-45B3-8BFE-46AD5FBC484E"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3E5B9F82-F87C-47E1-AA75-1B7F001CC7CA"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.1.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "4E247918-2EBC-4D6D-A899-2F25EB6B077F"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.1.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "863EAA3C-B10D-4211-BAD9-1CFA91F820AE"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.1.3:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "24F47A35-CC2A-4908-B678-FACD619EDDE2"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.1.4:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "FD666923-7DDA-4582-BA24-EA428E6485D9"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "5F946FB0-E890-41C3-BFDC-D7734CE3DDF3"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.1:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "CE2C95E3-0E29-49D9-A9ED-657BC2B05CCC"}, {"criteria": "cpe:2.3:a:fortinet:fortimail:5.2.2:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73CF2645-2997-4939-B9C0-D7A42ECAFEEC"}], "operator": "OR"}]}], "sourceIdentifier": "cve@mitre.org"}