Vulnerability Description
FortiMail 5.0.3 through 5.2.3 allows remote administrators to obtain credentials via the "diag debug application httpd" command.
CVSS Score
4.0
MEDIUM
AV:N/AC:L/Au:S/C:P/I:N/A:N
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Fortinet | Fortimail | 5.0.3 |
Related Weaknesses (CWE)
References
- http://www.fortiguard.com/advisory/FG-IR-15-009/Vendor Advisory
- http://www.securitytracker.com/id/1032185
- http://www.fortiguard.com/advisory/FG-IR-15-009/Vendor Advisory
- http://www.securitytracker.com/id/1032185
FAQ
What is CVE-2015-3293?
CVE-2015-3293 is a vulnerability with a CVSS score of 4.0 (MEDIUM). FortiMail 5.0.3 through 5.2.3 allows remote administrators to obtain credentials via the "diag debug application httpd" command.
How severe is CVE-2015-3293?
CVE-2015-3293 has been rated MEDIUM with a CVSS base score of 4.0/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2015-3293?
Check the references section above for vendor advisories and patch information. Affected products include: Fortinet Fortimail.