A improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.11, 6.2.0 through 6.2.12, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.1, 7.0.0 through 7.0.7, 2.0.0 through 2.0.10, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.
References
Link | Resource |
---|---|
https://fortiguard.com/psirt/FG-IR-22-362 | Patch Vendor Advisory |
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Information
Published : 2023-02-16 11:15
Updated : 2023-02-27 10:14
NVD link : CVE-2022-42472
Mitre link : CVE-2022-42472
JSON object : View
CWE
CWE-436
Interpretation Conflict
Products Affected
fortinet
- fortios
- fortiproxy