CVE-2005-3058
Severity CVSS v4.0:
Pending analysis
Type:
CWE-264
Permissions, Privileges, and Access Control
Publication date:
31/12/2005
Last modified:
21/11/2024
Description
Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
Impact
Base Score 2.0
7.50
Severity 2.0
HIGH
Vulnerable products and versions
CPE | From | Up to |
---|---|---|
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 2.8_mr10 (including) | |
cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* | 3_beta (including) | |
cpe:2.3:h:fortinet:fortigate:2.8:*:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042140.html
- http://secunia.com/advisories/18844
- http://www.fortiguard.com/advisory/FGA-2006-10.html
- http://www.securityfocus.com/archive/1/424858/100/0/threaded
- http://www.securityfocus.com/bid/16599
- http://www.vupen.com/english/advisories/2006/0539
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24626
- http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042140.html
- http://secunia.com/advisories/18844
- http://www.fortiguard.com/advisory/FGA-2006-10.html
- http://www.securityfocus.com/archive/1/424858/100/0/threaded
- http://www.securityfocus.com/bid/16599
- http://www.vupen.com/english/advisories/2006/0539
- https://exchange.xforce.ibmcloud.com/vulnerabilities/24626