CVE-2005-3058
| Summary |
Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
|
| Publication Date |
Dec. 31, 2005, 2 p.m. |
| Registration Date |
Jan. 29, 2021, 5:59 p.m. |
| Last Update |
Oct. 20, 2018, 12:34 a.m. |
|
CVSS2.0 : HIGH
|
| Score |
7.5
|
| Vector |
AV:N/AC:L/Au:N/C:P/I:P/A:P |
| 攻撃元区分(AV) |
ネットワーク |
| 攻撃条件の複雑さ(AC) |
低 |
| 攻撃前の認証要否(Au) |
不要 |
| 機密性への影響(C) |
低 |
| 完全性への影響(I) |
低 |
| 可用性への影響(A) |
低 |
| Get all privileges. |
いいえ
|
| Get user privileges |
いいえ
|
| Get other privileges |
はい
|
| User operation required |
いいえ
|
Affected software configurations
| Configuration1 |
or higher |
or less |
more than |
less than |
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
2.8_mr10 |
|
|
| cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* |
|
3_beta |
|
|
| Configuration2 |
or higher |
or less |
more than |
less than |
| cpe:2.3:h:fortinet:fortigate:2.8:*:*:*:*:*:*:* |
|
|
|
|
Related information, measures and tools
Common Vulnerabilities List