An improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS 7.2.0 through 7.6.0, FortiProxy 7.2.0 through 7.4.5 allows attacker to execute unauthorized code or commands via crafted HTTP header.
References
Link | Resource |
---|---|
https://fortiguard.fortinet.com/psirt/FG-IR-24-282 | Vendor Advisory |
Configurations
Configuration 1 (hide)
|
History
03 Feb 2025, 22:04
Type | Values Removed | Values Added |
---|---|---|
References | () https://fortiguard.fortinet.com/psirt/FG-IR-24-282 - Vendor Advisory | |
CPE | cpe:2.3:o:fortinet:fortios:*:*:*:*:*:*:*:* cpe:2.3:o:fortinet:fortios:7.6.0:*:*:*:*:*:*:* cpe:2.3:a:fortinet:fortiproxy:*:*:*:*:*:*:*:* |
|
CWE | CWE-436 | |
Summary |
|
|
First Time |
Fortinet fortiproxy
Fortinet Fortinet fortios |
14 Jan 2025, 14:15
Type | Values Removed | Values Added |
---|---|---|
New CVE |
Information
Published : 2025-01-14 14:15
Updated : 2025-02-03 22:04
NVD link : CVE-2024-54021
Mitre link : CVE-2024-54021
CVE.ORG link : CVE-2024-54021
JSON object : View
Products Affected
fortinet
- fortiproxy
- fortios