Public exploit available
Public proof-of-concept or exploit code exists (ExploitDB / Metasploit / Nuclei).

CVE-2005-3058Fortinet Fortios vulnerability

CWE-2644 documents4 sources
Severity
7.5HIGHNVD
EPSS
2.6%
top 14.23%
CISA KEV
Not in KEV
Exploit
PoC available
Public exploit / PoC exists
Timeline
PublishedDec 31
Latest updateMay 1

Description

Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.

CVSS vector

AV:N/AC:L/C:P/I:P/A:PExploitability: 10.0 | Impact: 6.4

Affected Packages2 packages

NVDfortinet/fortios2.8_mr10+1

🔴Vulnerability Details

2
GHSA
GHSA-h9mr-6gjh-qmfh: Interpretation conflict in Fortinet FortiGate 22022-05-01
CVEList
CVE-2005-3058: Interpretation conflict in Fortinet FortiGate 22006-02-14

💥Exploits & PoCs

1
Exploit-DB
Fortinet Fortigate 2.x/3.0 - URL Filtering Bypass2006-02-13