Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
References
Configurations
History
21 Nov 2024, 00:01
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042140.html - | |
References | () http://secunia.com/advisories/18844 - Vendor Advisory | |
References | () http://www.fortiguard.com/advisory/FGA-2006-10.html - | |
References | () http://www.securityfocus.com/archive/1/424858/100/0/threaded - | |
References | () http://www.securityfocus.com/bid/16599 - | |
References | () http://www.vupen.com/english/advisories/2006/0539 - Vendor Advisory | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/24626 - |
Information
Published : 2005-12-31 05:00
Updated : 2024-11-21 00:01
NVD link : CVE-2005-3058
Mitre link : CVE-2005-3058
CVE.ORG link : CVE-2005-3058
JSON object : View
Products Affected
fortinet
- fortigate
- fortios
CWE
CWE-264
Permissions, Privileges, and Access Controls