A improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.11, 6.2.0 through 6.2.12, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.1, 7.0.0 through 7.0.7, 2.0.0 through 2.0.10, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-362 | Patch Vendor Advisory |
https://fortiguard.com/psirt/FG-IR-22-362 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
History
21 Nov 2024, 07:25
Type | Values Removed | Values Added |
---|---|---|
CVSS |
v2 : v3 : |
v2 : unknown
v3 : 4.2 |
References | () https://fortiguard.com/psirt/FG-IR-22-362 - Patch, Vendor Advisory |
08 Aug 2023, 14:22
Type | Values Removed | Values Added |
---|---|---|
CWE | CWE-74 |
Information
Published : 2023-02-16 19:15
Updated : 2024-11-21 07:25
NVD link : CVE-2022-42472
Mitre link : CVE-2022-42472
CVE.ORG link : CVE-2022-42472
JSON object : View
Products Affected
fortinet
- fortiproxy
- fortios