An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.
References
Link | Resource |
---|---|
https://fortiguard.com/advisory/FG-IR-21-063 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
No history.
Information
Published : 2021-08-05 11:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-32598
Mitre link : CVE-2021-32598
CVE.ORG link : CVE-2021-32598
JSON object : View
Products Affected
fortinet
- fortimanager
- fortianalyzer
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')