Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p797-78m8-4ww4

Опубликовано: 24 мая 2022
Источник: github
Github: Не прошло ревью

Описание

An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.

An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.

EPSS

Процентиль: 34%
0.00138
Низкий

Дефекты

CWE-444

Связанные уязвимости

CVSS3: 4.3
nvd
больше 4 лет назад

An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.

CVSS3: 4.3
fstec
больше 4 лет назад

Уязвимость графического интерфейса программного средства централизованного управления устройствами Fortinet FortiManager и средства отслеживания и анализа событий безопасности Fortinet FortiAnalyzer, позволяющая нарушителю внедрить произвольные HTTP-заголовки

EPSS

Процентиль: 34%
0.00138
Низкий

Дефекты

CWE-444