An improper neutralization of crlf sequences (crlf injection) in Fortinet FortiMail 7.6.0 through 7.6.3, FortiMail 7.4.0 through 7.4.5, FortiMail 7.2 all versions, FortiMail 7.0 all versions may allow an attacker to inject headers in the response via convincing a user to click on a specifically crafted link
The product uses CRLF (carriage return line feeds) as a special element, e.g. to separate lines or records, but it does not neutralize or incorrectly neutralizes CRLF sequences from inputs.
| Name | Vendor | Start Version | End Version |
|---|---|---|---|
| Fortimail | Fortinet | 7.0.0 (including) | 7.4.6 (excluding) |
| Fortimail | Fortinet | 7.6.0 (including) | 7.6.4 (excluding) |