Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-07T22:53:30.384Z
Reserved: 2005-09-26T00:00:00
Link: CVE-2005-3058

No data.

Status : Modified
Published: 2005-12-31T05:00:00.000
Modified: 2024-11-21T00:01:01.887
Link: CVE-2005-3058

No data.