Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2005-2090

Опубликовано: 06 июн. 2005
Источник: redhat
EPSS Высокий

Описание

Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=237079tomcat multiple content-length header poisioning

EPSS

Процентиль: 99%
0.84365
Высокий

Связанные уязвимости

nvd
почти 20 лет назад

Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

debian
почти 20 лет назад

Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allo ...

github
около 3 лет назад

Tomcat Vulnerable to Web Cache Poisoning

oracle-oval
почти 18 лет назад

ELSA-2007-0327: Important: tomcat security update (IMPORTANT)

EPSS

Процентиль: 99%
0.84365
Высокий