HTTP Response Splitting in Fortinet FortiOS Enables Code Execution
Fortinet FortiOS versions 7.2.0 to 7.6.0 and FortiProxy versions 7.2.0 to 7.4.5 have a vulnerability of improper neutralization of CRLF sequences in HTTP headers, known as 'HTTP response splitting'. This lets an attacker execute unauthorized code or commands using a crafted HTTP header.
Vulnerable Product | Search on Vulmon | Subscribe to Product |
---|---|---|
fortinet fortios 7.6.0 |
||
fortinet fortios 7.4.4 |
||
fortinet fortios 7.4.3 |
||
fortinet fortios 7.4.2 |
||
fortinet fortios 7.4.1 |
||
fortinet fortios 7.4.0 |
||
fortinet fortios 7.2.8 |
||
fortinet fortios 7.2.7 |
||
fortinet fortios 7.2.6 |
||
fortinet fortios 7.2.5 |
||
fortinet fortios 7.2.4 |
||
fortinet fortios 7.2.3 |
||
fortinet fortios 7.2.2 |
||
fortinet fortios 7.2.1 |
||
fortinet fortios 7.2.0 |
||
fortinet fortios |
||
fortinet fortiproxy |