Description
Interpretation conflict in Fortinet FortiGate 2.8, running FortiOS 2.8MR10 and v3beta, allows remote attackers to bypass the URL blocker via an (1) HTTP request terminated with a line feed (LF) and not carriage return line feed (CRLF) or (2) HTTP request with no Host field, which is still processed by most web servers without violating RFC2616.
Exploits (1)
exploitdb
WORKING POC
VERIFIED
by Mathieu Dessus · perlremotehardware
https://www.exploit-db.com/exploits/27203
References (7)
Scores
EPSS
0.0265
EPSS Percentile
85.8%
Details
CWE
CWE-264
Status
published
Products (2)
fortinet/fortigate
2.8
fortinet/fortios
< 2.8_mr10
Published
Dec 31, 2005
Tracked Since
Feb 18, 2026