A improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.11, 6.2.0 through 6.2.12, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.1, 7.0.0 through 7.0.7, 2.0.0 through 2.0.10, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.
2023-02-16T19:15:13.583
2024-11-21T07:25:02.230
Modified
CVSSv3.1: 4.2 (MEDIUM)
Type | Vendor | Product | Version/Range | Vulnerable? |
---|---|---|---|---|
Application | fortinet | fortiproxy | ≤ 1.1.6 | Yes |
Application | fortinet | fortiproxy | ≤ 1.2.13 | Yes |
Application | fortinet | fortiproxy | ≤ 2.0.10 | Yes |
Application | fortinet | fortiproxy | ≤ 7.0.7 | Yes |
Application | fortinet | fortiproxy | 7.2.0 | Yes |
Application | fortinet | fortiproxy | 7.2.1 | Yes |
Operating System | fortinet | fortios | ≤ 6.0.16 | Yes |
Operating System | fortinet | fortios | ≤ 6.2.12 | Yes |
Operating System | fortinet | fortios | ≤ 6.4.11 | Yes |
Operating System | fortinet | fortios | ≤ 7.0.8 | Yes |
Operating System | fortinet | fortios | 7.2.0 | Yes |
Operating System | fortinet | fortios | 7.2.1 | Yes |
Operating System | fortinet | fortios | 7.2.2 | Yes |