First published: Fri Sep 04 2009(Updated: )
Fortinet FortiGuard Fortinet FortiGate-1000 3.00 build 040075,070111 allows remote attackers to bypass URL filtering via fragmented GET or POST requests that use HTTP/1.0 without the Host header. NOTE: this issue might be related to CVE-2005-3058.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiGate-1000 | =3.00 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-7161 is considered as having a medium severity due to the potential for remote attackers to bypass security measures.
To mitigate CVE-2008-7161, it is recommended to upgrade FortiGate-1000 to a version that addresses this vulnerability.
CVE-2008-7161 affects Fortinet FortiGate-1000 running version 3.00.
Yes, CVE-2008-7161 could potentially lead to data breaches by allowing attackers to circumvent URL filtering.
Yes, there are known exploit techniques which involve using fragmented HTTP requests to bypass filtering mechanisms.