CVE-2021-32598

An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.
References
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*

History

21 Nov 2024, 06:07

Type Values Removed Values Added
References () https://fortiguard.com/advisory/FG-IR-21-063 - Vendor Advisory () https://fortiguard.com/advisory/FG-IR-21-063 - Vendor Advisory

12 Aug 2021, 19:30

Type Values Removed Values Added
CWE CWE-444
CVSS v2 : unknown
v3 : unknown
v2 : 4.0
v3 : 4.3
CPE cpe:2.3:a:fortinet:fortimanager:*:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortianalyzer:*:*:*:*:*:*:*:*
References (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-063 - (CONFIRM) https://fortiguard.com/advisory/FG-IR-21-063 - Vendor Advisory

05 Aug 2021, 11:15

Type Values Removed Values Added
New CVE

Information

Published : 2021-08-05 11:15

Updated : 2024-11-21 06:07


NVD link : CVE-2021-32598

Mitre link : CVE-2021-32598

CVE.ORG link : CVE-2021-32598


JSON object : View

Products Affected

fortinet

  • fortimanager
  • fortianalyzer
CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')