CVE-2022-33876

Multiple instances of improper input validation vulnerability in Fortinet FortiADC version 7.1.0, version 7.0.0 through 7.0.2 and version 6.2.4 and below allows an authenticated attacker to retrieve files with specific extension from the underlying Linux system via crafted HTTP requests.
References
Link Resource
https://fortiguard.com/psirt/FG-IR-22-253 Vendor Advisory
Advertisement

NeevaHost hosting service

Configurations

Configuration 1 (hide)

OR cpe:2.3:a:fortinet:fortiadc:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:7.1.0:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:fortinet:fortiadc:*:*:*:*:*:*:*:*

Information

Published : 2022-12-06 09:15

Updated : 2022-12-07 13:43


NVD link : CVE-2022-33876

Mitre link : CVE-2022-33876


JSON object : View

CWE
CWE-444

Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')

Advertisement

dedicated server usa

Products Affected

fortinet

  • fortiadc