Header injection in proxy login page

Summary

An improper neutralization of CRLF sequences in HTTP headers ('HTTP Response Splitting') vulnerability [CWE-113] in FortiOS and FortiProxy may allow an authenticated and remote attacker to inject arbitrary headers.

Version Affected Solution
FortiOS 7.2 7.2.0 through 7.2.2 Upgrade to 7.2.3 or above
FortiOS 7.0 7.0.0 through 7.0.8 Upgrade to 7.0.9 or above
FortiOS 6.4 6.4.0 through 6.4.12 Upgrade to 6.4.13 or above
FortiOS 6.2 6.2 all versions Migrate to a fixed release
FortiOS 6.0 6.0 all versions Migrate to a fixed release
FortiProxy 7.2 7.2.0 through 7.2.1 Upgrade to 7.2.2 or above
FortiProxy 7.0 7.0.0 through 7.0.7 Upgrade to 7.0.8 or above
FortiProxy 2.0 2.0.0 through 2.0.10 Upgrade to 2.0.11 or above
FortiProxy 1.2 1.2 all versions Migrate to a fixed release
FortiProxy 1.1 1.1 all versions Migrate to a fixed release
Follow the recommended upgrade path using our tool at: https://docs.fortinet.com/upgrade-tool

Acknowledgement

Internally discovered and reported by Gwendal Guégniaud of Fortinet Product Security team.

Timeline

2023-02-16: Initial publication