// For flags

CVE-2005-3058

Fortinet Fortigate 2.x/3.0 - URL Filtering Bypass

Severity Score

7.5
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

1
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Authentication
None
Confidentiality
Partial
Integrity
Partial
Availability
Partial
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2005-09-26 CVE Reserved
  • 2005-12-31 CVE Published
  • 2006-02-13 First Exploit
  • 2024-06-05 EPSS Updated
  • 2024-08-07 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
CWE
  • CWE-264: Permissions, Privileges, and Access Controls
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Fortinet
Search vendor "Fortinet"
Fortios
Search vendor "Fortinet" for product "Fortios"
<= 2.8_mr10
Search vendor "Fortinet" for product "Fortios" and version " <= 2.8_mr10"
-
Affected
Fortinet
Search vendor "Fortinet"
Fortios
Search vendor "Fortinet" for product "Fortios"
<= 3_beta
Search vendor "Fortinet" for product "Fortios" and version " <= 3_beta"
-
Affected
Fortinet
Search vendor "Fortinet"
Fortigate
Search vendor "Fortinet" for product "Fortigate"
2.8
Search vendor "Fortinet" for product "Fortigate" and version "2.8"
-
Affected