Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
Weaknesses in this category are related to the management of permissions, privileges, and other security features that are used to perform access control.
Link | Tags |
---|---|
http://lists.grok.org.uk/pipermail/full-disclosure/2006-February/042140.html | mailing list |
http://www.securityfocus.com/archive/1/424858/100/0/threaded | mailing list |
https://exchange.xforce.ibmcloud.com/vulnerabilities/24626 | vdb entry |
http://www.securityfocus.com/bid/16599 | vdb entry |
http://secunia.com/advisories/18844 | third party advisory vendor advisory |
http://www.fortiguard.com/advisory/FGA-2006-10.html | |
http://www.vupen.com/english/advisories/2006/0539 | vdb entry vendor advisory |