CVE-2005-3058

Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
Configurations

Configuration 1 (hide)

OR cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*

Configuration 2 (hide)

cpe:2.3:h:fortinet:fortigate:2.8:*:*:*:*:*:*:*

History

21 Nov 2024, 00:01

Type Values Removed Values Added
References () http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042140.html - () http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042140.html -
References () http://secunia.com/advisories/18844 - Vendor Advisory () http://secunia.com/advisories/18844 - Vendor Advisory
References () http://www.fortiguard.com/advisory/FGA-2006-10.html - () http://www.fortiguard.com/advisory/FGA-2006-10.html -
References () http://www.securityfocus.com/archive/1/424858/100/0/threaded - () http://www.securityfocus.com/archive/1/424858/100/0/threaded -
References () http://www.securityfocus.com/bid/16599 - () http://www.securityfocus.com/bid/16599 -
References () http://www.vupen.com/english/advisories/2006/0539 - Vendor Advisory () http://www.vupen.com/english/advisories/2006/0539 - Vendor Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/24626 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/24626 -

Information

Published : 2005-12-31 05:00

Updated : 2024-11-21 00:01


NVD link : CVE-2005-3058

Mitre link : CVE-2005-3058

CVE.ORG link : CVE-2005-3058


JSON object : View

Products Affected

fortinet

  • fortios
  • fortigate
CWE
CWE-264

Permissions, Privileges, and Access Controls