CVE-2022-42472

A improper neutralization of crlf sequences in http headers ('http response splitting') in Fortinet FortiOS versions 7.2.0 through 7.2.2, 7.0.0 through 7.0.8, 6.4.0 through 6.4.11, 6.2.0 through 6.2.12, 6.0.0 through 6.0.16, FortiProxy 7.2.0 through 7.2.1, 7.0.0 through 7.0.7, 2.0.0 through 2.0.10, 1.2.0 through 1.2.13, 1.1.0 through 1.1.6 may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response.
HTTP Request/Response Splitting
Injection
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
4.2 MEDIUM
NETWORK
HIGH
LOW
CVSS:3.1/AV:N/AC:H/PR:L/UI:N/S:U/C:L/I:L/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: Unknown
Affected Products (NVD)
VendorProductVersion
fortinetfortiproxy
1.1.0 ≤
𝑥
≤ 1.1.6
fortinetfortiproxy
1.2.0 ≤
𝑥
≤ 1.2.13
fortinetfortiproxy
2.0.0 ≤
𝑥
≤ 2.0.10
fortinetfortiproxy
7.0.0 ≤
𝑥
≤ 7.0.7
fortinetfortiproxy
7.2.0
fortinetfortiproxy
7.2.1
fortinetfortios
6.0.1 ≤
𝑥
≤ 6.0.16
fortinetfortios
6.2.0 ≤
𝑥
≤ 6.2.12
fortinetfortios
6.4.0 ≤
𝑥
≤ 6.4.11
fortinetfortios
7.0.0 ≤
𝑥
≤ 7.0.8
fortinetfortios
7.2.0
fortinetfortios
7.2.1
fortinetfortios
7.2.2
𝑥
= Vulnerable software versions