7.5
CVSSv2

CVE-2005-3058

Published: 31/12/2005 Updated: 19/10/2018
CVSS v2 Base Score: 7.5 | Impact Score: 6.4 | Exploitability Score: 10
VMScore: 755
Vector: AV:N/AC:L/Au:N/C:P/I:P/A:P

Vulnerability Summary

Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote malicious users to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.

Vulnerable Product Search on Vulmon Subscribe to Product

fortinet fortios

fortinet fortigate 2.8

Exploits

source: wwwsecurityfocuscom/bid/16599/info Fortinet FortiGate is prone to a vulnerability that could allow users to bypass the device's URL filtering FortiGate devices running FortiOS v28MR10 and v3beta are vulnerable to this issue Other versions may also be affected # http_reqpl # # Made by (Mathieu Dessus) # # Make a filter for / ...