An improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header.
Solution:
The product receives data from an HTTP agent/component (e.g., web server, proxy, browser, etc.), but it does not neutralize or incorrectly neutralizes CR and LF characters before the data is included in outgoing HTTP headers.
Product A handles inputs or steps differently than Product B, which causes A to perform incorrect actions based on its perception of B's state.
Link | Tags |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-282 | vendor advisory |