Fortinet FortiManager/<others> <=7.4.3 Cache Poison via External Host Header
CVE-2022-23439 Published on January 22, 2025
A externally controlled reference to a resource in another sphere vulnerability in Fortinet allows attacker to poison web caches via crafted HTTP requests, where the `Host` header points to an arbitrary webserver
Vulnerability Analysis
CVE-2022-23439 can be exploited with network access, requires user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.
Weakness Type
Externally Controlled Reference to a Resource in Another Sphere
The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.
Products Associated with CVE-2022-23439
You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-23439 are published in these products:
Affected Versions
Fortinet FortiTester:- Version 7.2.0, <= 7.2.1 is affected.
- Version 7.1.0, <= 7.1.1 is affected.
- Version 7.0.0 is affected.
- Version 4.2.0, <= 4.2.1 is affected.
- Version 4.1.0, <= 4.1.1 is affected.
- Version 4.0.0 is affected.
- Version 3.9.0, <= 3.9.2 is affected.
- Version 3.8.0 is affected.
- Version 3.7.0, <= 3.7.1 is affected.
- Version 3.6.0 is affected.
- Version 3.5.0, <= 3.5.1 is affected.
- Version 3.4.0 is affected.
- Version 3.3.0, <= 3.3.1 is affected.
- Version 7.2.0 is affected.
- Version 7.0.0, <= 7.0.5 is affected.
- Version 6.4.0, <= 6.4.16 is affected.
- Version 6.2.0, <= 6.2.17 is affected.
- Version 6.0.0, <= 6.0.18 is affected.
- Version 6.4.0 and below 6.4.* is affected.
- Version 6.4.0, <= 6.4.2 is affected.
- Version 6.0.0, <= 6.0.10 is affected.
- Version 2.7.0, <= 2.7.7 is affected.
- Version 2.6.0, <= 2.6.3 is affected.
- Version 7.2.0 is affected.
- Version 7.1.0 is affected.
- Version 7.0.0, <= 7.0.7 is affected.
- Version 1.5.0, <= 1.5.3 is affected.
- Version 1.4.0 is affected.
- Version 1.3.0, <= 1.3.1 is affected.
- Version 1.2.0 is affected.
- Version 1.1.0 is affected.
- Version 7.0.0, <= 7.0.1 is affected.
- Version 6.2.0, <= 6.2.3 is affected.
- Version 6.1.0, <= 6.1.6 is affected.
- Version 6.0.0, <= 6.0.4 is affected.
- Version 5.4.0, <= 5.4.5 is affected.
- Version 5.3.0, <= 5.3.7 is affected.
- Version 5.2.0, <= 5.2.8 is affected.
- Version 5.1.0, <= 5.1.7 is affected.
- Version 5.0.0, <= 5.0.4 is affected.
- Version 7.4.0, <= 7.4.3 is affected.
- Version 7.2.0, <= 7.2.11 is affected.
- Version 7.0.0, <= 7.0.15 is affected.
- Version 6.4.0, <= 6.4.15 is affected.
- Version 6.2.0, <= 6.2.13 is affected.
- Version 7.0.0, <= 7.0.1 is affected.
- Version 6.4.0, <= 6.4.8 is affected.
- Version 6.0.0, <= 6.0.11 is affected.
- Version 7.2.0, <= 7.2.2 is affected.
- Version 7.0.0, <= 7.0.3 is affected.
- Version 6.4.3, <= 6.4.4 is affected.
- Version 6.4.0, <= 6.4.1 is affected.
- Version 5.5.0, <= 5.5.1 is affected.
- Version 5.4.0, <= 5.4.3 is affected.
- Version 5.3.0, <= 5.3.2 is affected.
- Version 5.2.0 is affected.
- Version 5.1.0 is affected.
- Version 5.0.0 is affected.
- Version 4.7.0 is affected.
- Version 4.6.0 is affected.
- Version 4.5.0 is affected.
- Version 8.6.0, <= 8.6.7 is affected.
- Version 8.5.0, <= 8.5.5 is affected.
- Version 8.4.4, <= 8.4.8 is affected.
- Version 8.4.0, <= 8.4.2 is affected.
- Version 7.4.0, <= 7.4.2 is affected.
- Version 7.2.0, <= 7.2.11 is affected.
- Version 7.0.0, <= 7.0.15 is affected.
- Version 6.4.0, <= 6.4.15 is affected.
- Version 6.2.0, <= 6.2.13 is affected.
- Version 6.0.0, <= 6.0.9 is affected.
- Version 6.4.0, <= 6.4.1 is affected.
- Version 6.3.0, <= 6.3.3 is affected.
- Version 6.2.0, <= 6.2.2 is affected.
- Version 6.1.0, <= 6.1.3 is affected.
- Version 6.0.0, <= 6.0.8 is affected.
- Version 5.5.0 is affected.
- Version 5.4.0, <= 5.4.1 is affected.
- Version 5.3.0, <= 5.3.1 is affected.
- Version 5.2.0, <= 5.2.2 is affected.
- Version 5.1.0, <= 5.1.2 is affected.
- Version 7.0.0, <= 7.0.3 is affected.
- Version 6.4.0, <= 6.4.8 is affected.
- Version 6.2.0, <= 6.2.9 is affected.
- Version 6.0.0, <= 6.0.12 is affected.
- Version 5.4.0, <= 5.4.12 is affected.
- Version 6.3.0, <= 6.3.3 is affected.
- Version 6.2.0, <= 6.2.3 is affected.
- Version 6.1.0, <= 6.1.5 is affected.
- Version 7.0.0, <= 7.0.4 is affected.
- Version 6.4.0, <= 6.4.10 is affected.
- Version 6.2.0, <= 6.2.8 is affected.
- Version 6.0.0, <= 6.0.7 is affected.
- Version 7.0.0, <= 7.0.4 is affected.
- Version 2.0.0, <= 2.0.14 is affected.
- Version 1.2.0, <= 1.2.13 is affected.
- Version 1.1.0, <= 1.1.6 is affected.
- Version 1.0.0, <= 1.0.7 is affected.
Exploit Probability
EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.