Improper Request Handling Vulnerability in FortiADC by Fortinet
CVE-2022-38381
Summary
A vulnerability exists in FortiADC that stems from improper handling of malformed HTTP requests. This flaw may allow remote attackers, without necessary privileges, to bypass essential Web Application Firewall (WAF) protections, including those specifically designed to guard against SQL Injection and Cross-Site Scripting (XSS) attacks. The affected versions span several releases of FortiADC, thereby potentially exposing a wide range of deployments to security risks. For more details, refer to the official Fortinet advisory.
Affected Version(s)
Fortinet FortiADC FortiADC 7.0.2, 7.0.1, 7.0.0, 6.2.3, 6.2.2, 6.2.1, 6.2.0, 6.1.6, 6.1.5, 6.1.4, 6.1.3, 6.1.2, 6.1.1, 6.1.0, 6.0.4, 6.0.3, 6.0.2, 6.0.1, 6.0.0, 5.4.5, 5.4.4, 5.4.3, 5.4.2, 5.4.1, 5.4.0, 5.3.7, 5.3.6, 5.3.5, 5.3.4, 5.3.3, 5.3.2, 5.3.1, 5.3.0, 5.2.8, 5.2.7, 5.2.6, 5.2.5, 5.2.4, 5.2.3, 5.2.2, 5.2.1, 5.2.0, 5.1.7, 5.1.6, 5.1.5, 5.1.4, 5.1.3, 5.1.2, 5.1.1, 5.1.0, 5.0.4, 5.0.3, 5.0.2, 5.0.1, 5.0.0
References
CVSS V3.1
Timeline
Vulnerability published
Vulnerability Reserved