First published: Tue Jan 14 2025(Updated: )
An improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header.
Credit: psirt@fortinet.com
Affected Software | Affected Version | How to fix |
---|---|---|
Fortinet FortiOS | =. | |
Fortinet FortiOS | >=7.4.0<=7.4.4 | |
Fortinet FortiOS | >=7.2.0<=7.2.8 | |
Fortinet FortiProxy | >=7.4.0<=7.4.5 | |
Fortinet FortiProxy | >=7.2.0<=7.2.11 |
Please upgrade to FortiSASE version 24.3.c or above Please upgrade to FortiOS version 7.6.1 or above Please upgrade to FortiOS version 7.4.5 or above Please upgrade to FortiOS version 7.2.9 or above Please upgrade to FortiProxy version 7.4.6 or above Please upgrade to FortiProxy version 7.2.12 or above
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.