ID CVE-2005-2088
Summary The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
References
Vulnerable Configurations
  • Apache Software Foundation Apache HTTP Server 1.3.29
    cpe:2.3:a:apache:http_server:1.3.29
  • Apache Software Foundation Apache HTTP Server 1.3.30
    cpe:2.3:a:apache:http_server:1.3.30
  • Apache Software Foundation Apache HTTP Server 1.3.31
    cpe:2.3:a:apache:http_server:1.3.31
  • Apache Software Foundation Apache HTTP Server 1.3.32
    cpe:2.3:a:apache:http_server:1.3.32
  • Apache Software Foundation Apache HTTP Server 1.3.33
    cpe:2.3:a:apache:http_server:1.3.33
  • Apache Software Foundation Apache HTTP Server 2.0.45
    cpe:2.3:a:apache:http_server:2.0.45
  • Apache Software Foundation Apache HTTP Server 2.0.46
    cpe:2.3:a:apache:http_server:2.0.46
  • Apache Software Foundation Apache HTTP Server 2.0.47
    cpe:2.3:a:apache:http_server:2.0.47
  • Apache Software Foundation Apache HTTP Server 2.0.48
    cpe:2.3:a:apache:http_server:2.0.48
  • Apache Software Foundation Apache HTTP Server 2.0.49
    cpe:2.3:a:apache:http_server:2.0.49
  • Apache Software Foundation Apache HTTP Server 2.0.50
    cpe:2.3:a:apache:http_server:2.0.50
  • Apache Software Foundation Apache HTTP Server 2.0.51
    cpe:2.3:a:apache:http_server:2.0.51
  • Apache Software Foundation Apache HTTP Server 2.0.52
    cpe:2.3:a:apache:http_server:2.0.52
  • Apache Software Foundation Apache HTTP Server 2.0.53
    cpe:2.3:a:apache:http_server:2.0.53
  • Apache Software Foundation Apache HTTP Server 2.0.54
    cpe:2.3:a:apache:http_server:2.0.54
CVSS
Base: 4.3 (as of 05-07-2005 - 14:17)
Impact:
Exploitability:
Access
VectorComplexityAuthentication
NETWORK MEDIUM NONE
Impact
ConfidentialityIntegrityAvailability
NONE PARTIAL NONE
nessus via4
  • NASL family Red Hat Local Security Checks
    NASL id REDHAT-RHSA-2005-582.NASL
    description Updated Apache httpd packages to correct two security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Apache HTTP Server is a powerful, full-featured, efficient, and freely-available Web server. Watchfire reported a flaw that occured when using the Apache server as an HTTP proxy. A remote attacker could send an HTTP request with both a 'Transfer-Encoding: chunked' header and a 'Content-Length' header. This caused Apache to incorrectly handle and forward the body of the request in a way that the receiving server processes it as a separate HTTP request. This could allow the bypass of Web application firewall protection or lead to cross-site scripting (XSS) attacks. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2005-2088 to this issue. Marc Stern reported an off-by-one overflow in the mod_ssl CRL verification callback. In order to exploit this issue the Apache server would need to be configured to use a malicious certificate revocation list (CRL). The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2005-1268 to this issue. Users of Apache httpd should update to these errata packages that contain backported patches to correct these issues.
    last seen 2019-01-16
    modified 2018-11-27
    plugin id 19296
    published 2005-07-25
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19296
    title RHEL 3 / 4 : httpd (RHSA-2005:582)
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-160-1.NASL
    description Marc Stern discovered a buffer overflow in the SSL module's certificate revocation list (CRL) handler. If Apache is configured to use a malicious CRL, this could possibly lead to a server crash or arbitrary code execution with the privileges of the Apache web server. (CAN-2005-1268) Watchfire discovered that Apache insufficiently verified the 'Transfer-Encoding' and 'Content-Length' headers when acting as an HTTP proxy. By sending a specially crafted HTTP request, a remote attacker who is authorized to use the proxy could exploit this to bypass web application firewalls, poison the HTTP proxy cache, and conduct cross-site scripting attacks against other proxy users. (CAN-2005-2088). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-01-16
    modified 2019-01-02
    plugin id 20565
    published 2006-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20565
    title Ubuntu 4.10 / 5.04 : apache2 vulnerabilities (USN-160-1)
  • NASL family MacOS X Local Security Checks
    NASL id MACOSX_SECUPD2005-009.NASL
    description The remote host is running Apple Mac OS X, but lacks Security Update 2005-009. This security update contains fixes for the following applications : - Apache2 - Apache_mod_ssl - CoreFoundation - curl - iodbcadmintool - OpenSSL - passwordserver - Safari - sudo - syslog
    last seen 2019-01-16
    modified 2018-07-14
    plugin id 20249
    published 2005-11-30
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20249
    title Mac OS X Multiple Vulnerabilities (Security Update 2005-009)
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-129.NASL
    description Marc Stern reported an off-by-one overflow in the mod_ssl CRL verification callback which can only be exploited if the Apache server is configured to use a malicious certificate revocation list (CVE-2005-1268). Watchfire reported a flaw that occured when using the Apache server as a HTTP proxy. A remote attacker could send an HTTP request with both a 'Transfer-Encoding: chunked' header and a 'Content-Length' header which would cause Apache to incorrectly handle and forward the body of the request in a way that the receiving server processed it as a separate HTTP request. This could be used to allow the bypass of web application firewall protection or lead to cross-site scripting (XSS) attacks (CVE-2005-2088). The updated packages have been patched to prevent these issues.
    last seen 2019-01-16
    modified 2018-12-05
    plugin id 19889
    published 2005-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19889
    title Mandrake Linux Security Advisory : apache2 (MDKSA-2005:129)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34203.NASL
    description s700_800 11.04 Webproxy 2.1 (Apache 1.x) update : A security vulnerability has been identified in Apache HTTP server versions prior to Apache 1.3.34 that may allow HTTP Request Splitting/Spoofing attacks, resulting in remote unauthorized access. References: Apache HTTP Server version 1.3.34 announcement.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21112
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21112
    title HP-UX PHSS_34203 : HP-UX VirtualVault running Apache 1.3.X Remote Unauthorized Access (HPSBUX02101 SSRT051128 rev.1)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34123.NASL
    description s700_800 11.04 Virtualvault 4.7 OWS (Apache 2.x) update : Potential security vulnerabilities have been identified with Apache running on HP-UX. These vulnerability could be exploited remotely to allow execution of arbitrary code, Denial of Service (DoS), or unauthorized access.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21107
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21107
    title HP-UX PHSS_34123 : Apache-based Web Server on HP-UX mod_ssl, proxy_http, Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access (HPSBUX02074 SSRT051251 rev.2)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34120.NASL
    description s700_800 11.04 Virtualvault 4.6 OWS update : A security vulnerability has been identified in Apache HTTP server versions prior to Apache 1.3.34 that may allow HTTP Request Splitting/Spoofing attacks, resulting in remote unauthorized access. References: Apache HTTP Server version 1.3.34 announcement.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21105
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21105
    title HP-UX PHSS_34120 : HP-UX VirtualVault running Apache 1.3.X Remote Unauthorized Access (HPSBUX02101 SSRT051128 rev.1)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34169.NASL
    description s700_800 11.04 Virtualvault 4.7 IWS update : A security vulnerability has been identified in Apache HTTP server versions prior to Apache 1.3.34 that may allow HTTP Request Splitting/Spoofing attacks, resulting in remote unauthorized access. References: Apache HTTP Server version 1.3.34 announcement.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21109
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21109
    title HP-UX PHSS_34169 : HP-UX VirtualVault running Apache 1.3.X Remote Unauthorized Access (HPSBUX02101 SSRT051128 rev.1)
  • NASL family FreeBSD Local Security Checks
    NASL id FREEBSD_PKG_651996E0FE0711D98329000E0C2E438A.NASL
    description A Watchfire whitepaper reports an vulnerability in the Apache webserver. The vulnerability can be exploited by malicious people causing cross site scripting, web cache poisoining, session hijacking and most importantly the ability to bypass web application firewall protection. Exploiting this vulnerability requires multiple carefully crafted HTTP requests, taking advantage of an caching server, proxy server, web application firewall etc. This only affects installations where Apache is used as HTTP proxy in combination with the following web servers : - IIS/6.0 and 5.0 - Apache 2.0.45 (as web server) - apache 1.3.29 - WebSphere 5.1 and 5.0 - WebLogic 8.1 SP1 - Oracle9iAS web server 9.0.2 - SunONE web server 6.1 SP4
    last seen 2019-01-16
    modified 2018-12-05
    plugin id 19346
    published 2005-08-01
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19346
    title FreeBSD : apache -- http request smuggling (651996e0-fe07-11d9-8329-000e0c2e438a)
  • NASL family CentOS Local Security Checks
    NASL id CENTOS_RHSA-2005-582.NASL
    description Updated Apache httpd packages to correct two security issues are now available for Red Hat Enterprise Linux 3 and 4. This update has been rated as having moderate security impact by the Red Hat Security Response Team. The Apache HTTP Server is a powerful, full-featured, efficient, and freely-available Web server. Watchfire reported a flaw that occured when using the Apache server as an HTTP proxy. A remote attacker could send an HTTP request with both a 'Transfer-Encoding: chunked' header and a 'Content-Length' header. This caused Apache to incorrectly handle and forward the body of the request in a way that the receiving server processes it as a separate HTTP request. This could allow the bypass of Web application firewall protection or lead to cross-site scripting (XSS) attacks. The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2005-2088 to this issue. Marc Stern reported an off-by-one overflow in the mod_ssl CRL verification callback. In order to exploit this issue the Apache server would need to be configured to use a malicious certificate revocation list (CRL). The Common Vulnerabilities and Exposures project (cve.mitre.org) assigned the name CVE-2005-1268 to this issue. Users of Apache httpd should update to these errata packages that contain backported patches to correct these issues.
    last seen 2019-01-16
    modified 2018-11-10
    plugin id 21843
    published 2006-07-03
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21843
    title CentOS 3 / 4 : httpd (CESA-2005:582)
  • NASL family Web Servers
    NASL id APACHE_2_0_55.NASL
    description The remote host appears to be running a version of Apache that is prior to 2.0.55. It is, therefore affected by multiple vulnerabilities : - A security issue exists where 'SSLVerifyClient' is not enforced in per-location context if 'SSLVerifyClient optional' is configured in the vhost configuration. (CVE-2005-2700) - A denial of service vulnerability exists when processing a large byte range request, as well as a flaw in the 'worker.c' module which could allow an attacker to force this service to consume excessive amounts of memory. (CVE-2005-2970) - When Apache is acting as a proxy, it is possible for a remote attacker to poison the web cache, bypass web application firewall protection, and conduct cross-site scripting attacks via an HTTP request with both a 'Transfer-Encoding: chunked' header and a 'Content-Length' header. (CVE-2005-2088) - Multiple integer overflows exists in PCRE in quantifier parsing which could be triggered by a local user through use of a specially crafted regex in an .htaccess file. (CVE-2005-2491) - An issue exists where the byte range filter buffers responses into memory. (CVE-2005-2728) - An off-by-one overflow exists in mod_ssl while printing CRL information at 'LogLevel debug' which could be triggered if configured to use a 'malicious CRL'. (CVE-2005-1268)
    last seen 2019-01-16
    modified 2018-06-29
    plugin id 31656
    published 2008-03-26
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=31656
    title Apache < 2.0.55 Multiple Vulnerabilities
  • NASL family Slackware Local Security Checks
    NASL id SLACKWARE_SSA_2005-310-04.NASL
    description New apache packages are available for Slackware 8.1, 9.0, 9.1, 10.0, 10.1, 10.2, and -current to fix potential security issues: * If a request contains both Transfer-Encoding and Content-Length headers, remove the Content-Length, mitigating some HTTP Request Splitting/Spoofing attacks. * Added TraceEnable [on|off|extended] per-server directive to alter the behavior of the TRACE method. It's hard to say how much real-world impact these have, as there's no more information about that in the announcement. The original Apache announement can be read here: http://www.apache.org/dist/httpd/Announcement1.3.html Note that if you use mod_ssl, you will also need a new mod_ssl package. These have been provided for the same releases of Slackware.
    last seen 2019-01-16
    modified 2018-08-09
    plugin id 20151
    published 2005-11-07
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20151
    title Slackware 10.0 / 10.1 / 10.2 / 8.1 / 9.0 / 9.1 / current : apache (SSA:2005-310-04)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-803.NASL
    description A vulnerability has been discovered in the Apache web server. When it is acting as an HTTP proxy, it allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct cross-site scripting attacks, which causes Apache to incorrectly handle and forward the body of the request. The fix for this bug is contained in the apache-common package which means that there isn't any need for a separate update of the apache-perl and apache-ssl package.
    last seen 2019-01-16
    modified 2018-08-09
    plugin id 19610
    published 2005-09-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19610
    title Debian DSA-803-1 : apache - programming error
  • NASL family Ubuntu Local Security Checks
    NASL id UBUNTU_USN-160-2.NASL
    description USN-160-1 fixed two vulnerabilities in the Apache 2 server. The old Apache 1 server was also vulnerable to one of the vulnerabilities (CAN-2005-2088). Please note that Apache 1 is not officially supported in Ubuntu (it is in the 'universe' component of the archive). For reference, this is the relevant part of the original advisory : Watchfire discovered that Apache insufficiently verified the 'Transfer-Encoding' and 'Content-Length' headers when acting as an HTTP proxy. By sending a specially crafted HTTP request, a remote attacker who is authorized to use the proxy could exploit this to bypass web application firewalls, poison the HTTP proxy cache, and conduct cross-site scripting attacks against other proxy users. (CAN-2005-2088). Note that Tenable Network Security has extracted the preceding description block directly from the Ubuntu security advisory. Tenable has attempted to automatically clean and format it as much as possible without introducing additional issues.
    last seen 2019-01-16
    modified 2018-08-15
    plugin id 20566
    published 2006-01-15
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=20566
    title Ubuntu 4.10 / 5.04 : apache vulnerability (USN-160-2)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34163.NASL
    description s700_800 11.04 Webproxy server 2.1 (Apache 2.x) update : Potential security vulnerabilities have been identified with Apache running on HP-UX. These vulnerability could be exploited remotely to allow execution of arbitrary code, Denial of Service (DoS), or unauthorized access.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21108
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21108
    title HP-UX PHSS_34163 : Apache-based Web Server on HP-UX mod_ssl, proxy_http, Remote Execution of Arbitrary Code, Denial of Service (DoS), and Unauthorized Access (HPSBUX02074 SSRT051251 rev.2)
  • NASL family Debian Local Security Checks
    NASL id DEBIAN_DSA-805.NASL
    description Several problems have been discovered in Apache2, the next generation, scalable, extendable web server. The Common Vulnerabilities and Exposures project identifies the following problems : - CAN-2005-1268 Marc Stern discovered an off-by-one error in the mod_ssl Certificate Revocation List (CRL) verification callback. When Apache is configured to use a CRL this can be used to cause a denial of service. - CAN-2005-2088 A vulnerability has been discovered in the Apache web server. When it is acting as an HTTP proxy, it allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct cross-site scripting attacks, which causes Apache to incorrectly handle and forward the body of the request. - CAN-2005-2700 A problem has been discovered in mod_ssl, which provides strong cryptography (HTTPS support) for Apache that allows remote attackers to bypass access restrictions. - CAN-2005-2728 The byte-range filter in Apache 2.0 allows remote attackers to cause a denial of service via an HTTP header with a large Range field.
    last seen 2019-01-16
    modified 2018-07-20
    plugin id 19612
    published 2005-09-12
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19612
    title Debian DSA-805-1 : apache2 - several vulnerabilities
  • NASL family Mandriva Local Security Checks
    NASL id MANDRAKE_MDKSA-2005-130.NASL
    description Watchfire reported a flaw that occured when using the Apache server as a HTTP proxy. A remote attacker could send an HTTP request with both a 'Transfer-Encoding: chunked' header and a 'Content-Length' header which would cause Apache to incorrectly handle and forward the body of the request in a way that the receiving server processed it as a separate HTTP request. This could be used to allow the bypass of web application firewall protection or lead to cross-site scripting (XSS) attacks (CVE-2005-2088). The updated packages have been patched to prevent these issues.
    last seen 2019-01-16
    modified 2018-12-05
    plugin id 19890
    published 2005-10-05
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=19890
    title Mandrake Linux Security Advisory : apache (MDKSA-2005:130)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34121.NASL
    description s700_800 11.04 Virtualvault 4.7 (Apache 1.x) OWS update : A security vulnerability has been identified in Apache HTTP server versions prior to Apache 1.3.34 that may allow HTTP Request Splitting/Spoofing attacks, resulting in remote unauthorized access. References: Apache HTTP Server version 1.3.34 announcement.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21106
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21106
    title HP-UX PHSS_34121 : HP-UX VirtualVault running Apache 1.3.X Remote Unauthorized Access (HPSBUX02101 SSRT051128 rev.1)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34119.NASL
    description s700_800 11.04 Virtualvault 4.5 OWS update : A security vulnerability has been identified in Apache HTTP server versions prior to Apache 1.3.34 that may allow HTTP Request Splitting/Spoofing attacks, resulting in remote unauthorized access. References: Apache HTTP Server version 1.3.34 announcement.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21104
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21104
    title HP-UX PHSS_34119 : HP-UX VirtualVault running Apache 1.3.X Remote Unauthorized Access (HPSBUX02101 SSRT051128 rev.1)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34204.NASL
    description s700_800 11.04 Webproxy server 2.0 update : A security vulnerability has been identified in Apache HTTP server versions prior to Apache 1.3.34 that may allow HTTP Request Splitting/Spoofing attacks, resulting in remote unauthorized access. References: Apache HTTP Server version 1.3.34 announcement.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21113
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21113
    title HP-UX PHSS_34204 : HP-UX VirtualVault running Apache 1.3.X Remote Unauthorized Access (HPSBUX02101 SSRT051128 rev.1)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34170.NASL
    description s700_800 11.04 Virtualvault 4.6 IWS update : A security vulnerability has been identified in Apache HTTP server versions prior to Apache 1.3.34 that may allow HTTP Request Splitting/Spoofing attacks, resulting in remote unauthorized access. References: Apache HTTP Server version 1.3.34 announcement.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21110
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21110
    title HP-UX PHSS_34170 : HP-UX VirtualVault running Apache 1.3.X Remote Unauthorized Access (HPSBUX02101 SSRT051128 rev.1)
  • NASL family HP-UX Local Security Checks
    NASL id HPUX_PHSS_34171.NASL
    description s700_800 11.04 Virtualvault 4.5 IWS Update : A security vulnerability has been identified in Apache HTTP server versions prior to Apache 1.3.34 that may allow HTTP Request Splitting/Spoofing attacks, resulting in remote unauthorized access. References: Apache HTTP Server version 1.3.34 announcement.
    last seen 2019-01-16
    modified 2018-07-12
    plugin id 21111
    published 2006-03-21
    reporter Tenable
    source https://www.tenable.com/plugins/index.php?view=single&id=21111
    title HP-UX PHSS_34171 : HP-UX VirtualVault running Apache 1.3.X Remote Unauthorized Access (HPSBUX02101 SSRT051128 rev.1)
oval via4
  • accepted 2013-04-29T04:14:08.508-04:00
    class vulnerability
    contributors
    • name Aharon Chernin
      organization SCAP.com, LLC
    • name Dragos Prisaca
      organization G2, Inc.
    definition_extensions
    • comment The operating system installed on the system is Red Hat Enterprise Linux 3
      oval oval:org.mitre.oval:def:11782
    • comment CentOS Linux 3.x
      oval oval:org.mitre.oval:def:16651
    • comment The operating system installed on the system is Red Hat Enterprise Linux 4
      oval oval:org.mitre.oval:def:11831
    • comment CentOS Linux 4.x
      oval oval:org.mitre.oval:def:16636
    • comment Oracle Linux 4.x
      oval oval:org.mitre.oval:def:15990
    description The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
    family unix
    id oval:org.mitre.oval:def:11452
    status accepted
    submitted 2010-07-09T03:56:16-04:00
    title The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
    version 23
  • accepted 2010-09-20T04:00:09.602-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Todd Dolinsky
      organization Opsware, Inc.
    • name Todd Dolinsky
      organization Opsware, Inc.
    • name Jonathan Baker
      organization The MITRE Corporation
    description The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
    family unix
    id oval:org.mitre.oval:def:1237
    status accepted
    submitted 2006-03-18T07:24:00.000-04:00
    title Webproxy HTTP Request Smuggling (B.11.04)
    version 35
  • accepted 2007-10-02T08:08:09.431-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Todd Dolinsky
      organization Opsware, Inc.
    description The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
    family unix
    id oval:org.mitre.oval:def:1526
    status accepted
    submitted 2006-03-18T07:24:00.000-04:00
    title VirusVault HTTP Request Smuggling
    version 31
  • accepted 2007-10-02T08:08:10.027-04:00
    class vulnerability
    contributors
    • name Robert L. Hollis
      organization ThreatGuard, Inc.
    • name Todd Dolinsky
      organization Opsware, Inc.
    description The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
    family unix
    id oval:org.mitre.oval:def:1629
    status accepted
    submitted 2006-03-18T07:24:00.000-04:00
    title Webproxy HTTP Request Smuggling
    version 31
  • accepted 2006-01-25T07:30:00.000-04:00
    class vulnerability
    contributors
    name Robert L. Hollis
    organization ThreatGuard, Inc.
    description The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
    family unix
    id oval:org.mitre.oval:def:840
    status accepted
    submitted 2005-11-30T12:00:00.000-04:00
    title Apache HTTP Request Smuggling
    version 32
redhat via4
advisories
rhsa
id RHSA-2005:582
refmap via4
aixapar
  • PK13959
  • PK16139
apple APPLE-SA-2005-11-29
bid
  • 14106
  • 15647
bugtraq 20050606 A new whitepaper by Watchfire - HTTP Request Smuggling
confirm
debian
  • DSA-803
  • DSA-805
hp
  • HPSBUX02074
  • HPSBUX02101
  • SSRT051128
  • SSRT051251
mandriva MDKSA-2005:130
misc
mlist [apache-httpd-announce] 20051014 Apache HTTP Server 2.0.55 Released
sectrack 1014323
secunia
  • 14530
  • 17319
  • 17487
  • 17813
  • 19072
  • 19073
  • 19185
  • 19317
  • 23074
slackware SSA:2005-310-04
sreason 604
sunalert
  • 102197
  • 102198
suse
  • SUSE-SA:2005:046
  • SUSE-SR:2005:018
trustix TSLSA-2005-0059
ubuntu USN-160-2
vupen
  • ADV-2005-2140
  • ADV-2005-2659
  • ADV-2006-0789
  • ADV-2006-1018
  • ADV-2006-4680
statements via4
contributor Mark J Cox
lastmodified 2008-07-02
organization Apache
statement Fixed in Apache HTTP Server 2.0.55: http://httpd.apache.org/security/vulnerabilities_20.html
Last major update 17-10-2016 - 23:24
Published 05-07-2005 - 00:00
Last modified 19-10-2018 - 11:32
Back to Top