Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2005-2088

Опубликовано: 05 июл. 2005
Источник: ubuntu
Приоритет: medium
EPSS Высокий
CVSS2: 4.3

Описание

The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

РелизСтатусПримечание
dapper

released

1.3.34-2ubuntu0.1
devel

DNE

edgy

released

1.3.34-4ubuntu1
feisty

released

1.3.34-4ubuntu1
upstream

needs-triage

Показывать по

РелизСтатусПримечание
dapper

released

2.0.55-4ubuntu2.2
devel

released

2.2.4-3
edgy

released

2.0.55-4ubuntu4.1
feisty

released

2.2.3-3.2ubuntu0.1
upstream

needs-triage

Показывать по

EPSS

Процентиль: 99%
0.82742
Высокий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 20 лет назад

The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

nvd
около 20 лет назад

The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

debian
около 20 лет назад

The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when ac ...

github
больше 3 лет назад

The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

EPSS

Процентиль: 99%
0.82742
Высокий

4.3 Medium

CVSS2