CVE-2021-32598
Summary
| CVE | CVE-2021-32598 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2021-08-05 11:15:00 UTC |
| Updated | 2021-08-12 19:30:00 UTC |
| Description | An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability In FortiManager and FortiAnalyzer GUI 7.0.0, 6.4.6 and below, 6.2.8 and below, 6.0.11 and below, 5.6.11 and below may allow an authenticated and remote attacker to perform an HTTP request splitting attack which gives attackers control of the remaining headers and body of the response. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| FortiManager & FortiAnalyzer - HTTP response splitting vulnerability | FortiGuard |
CONFIRM |
fortiguard.com |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
No vendor comments have been submitted for this CVE.
Legacy QID Mappings
- 376127 FortiGate FortiManager and FortiAnalyzer Hypertext Transfer Protocol (HTTP) splitting Vulnerability (CWE-113)