Fortinet FortiManager/<others> <=7.4.3 Cache Poison via External Host Header
CVE-2022-23439 Published on January 22, 2025

A externally controlled reference to a resource in another sphere vulnerability in Fortinet allows attacker to poison web caches via crafted HTTP requests, where the `Host` header points to an arbitrary webserver

NVD

Vulnerability Analysis

CVE-2022-23439 can be exploited with network access, requires user interaction. This vulnerability is consided to have a high level of attack complexity. The potential impact of an exploit of this vulnerability is considered to have a small impact on confidentiality and integrity, and no impact on availability.

Attack Vector:
NETWORK
Attack Complexity:
HIGH
Privileges Required:
NONE
User Interaction:
REQUIRED
Scope:
CHANGED
Confidentiality Impact:
LOW
Integrity Impact:
LOW
Availability Impact:
NONE

Weakness Type

Externally Controlled Reference to a Resource in Another Sphere

The product uses an externally controlled name or reference that resolves to a resource that is outside of the intended control sphere.


Products Associated with CVE-2022-23439

You can be notified by email with stack.watch whenever vulnerabilities like CVE-2022-23439 are published in these products:

 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 
 

Affected Versions

Fortinet FortiTester: Fortinet FortiOS: Fortinet FortiRecorder: Fortinet FortiNDR: Fortinet FortiADC: Fortinet FortiManager: Fortinet FortiVoice: Fortinet FortiSOAR on-premise: Fortinet FortiDDoS: Fortinet FortiWLC: Fortinet FortiAnalyzer: Fortinet FortiPortal: Fortinet FortiAuthenticator: Fortinet FortiMail: Fortinet FortiDDoS-F: Fortinet FortiSwitch: Fortinet FortiProxy:

Exploit Probability

EPSS
0.28%
Percentile
51.02%

EPSS (Exploit Prediction Scoring System) scores estimate the probability that a vulnerability will be exploited in the wild within the next 30 days. The percentile shows you how this score compares to all other vulnerabilities.