CVE-2005-3058
Published Dec 31, 2005
Last updated 6 years ago
Overview
- Description
- Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
- Source
- cve@mitre.org
- NVD status
- Modified
Risk scores
CVSS 2.0
- Type
- Primary
- Base score
- 7.5
- Impact score
- 6.4
- Exploitability score
- 10
- Vector string
- AV:N/AC:L/Au:N/C:P/I:P/A:P
Weaknesses
- nvd@nist.gov
- CWE-264
Social media
- Hype score
- Not currently trending
Configurations
[ { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "7363C344-1CA6-4F53-8004-689633230CCC", "versionEndIncluding": "2.8_mr10" }, { "criteria": "cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "3B78DFB1-2D05-4AAE-BB9E-B6653C3164B4", "versionEndIncluding": "3_beta" } ], "operator": "OR" } ] }, { "nodes": [ { "negate": false, "cpeMatch": [ { "criteria": "cpe:2.3:h:fortinet:fortigate:2.8:*:*:*:*:*:*:*", "vulnerable": true, "matchCriteriaId": "73B13D8D-D888-41BE-A9A3-85053378769D" } ], "operator": "OR" } ] } ]