First published: Thu Jun 30 2005(Updated: )
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
Credit: secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Http Server | >=2.0.35<2.0.55 | |
Debian | =3.0 | |
Debian | =3.1 | |
Apache Http Server | >=2.0.35<=2.0.55 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2005-2088 has a high severity level due to its potential to allow exploitation of web cache poisoning and XSS attacks.
To fix CVE-2005-2088, upgrade to Apache HTTP Server version 1.3.34 or 2.0.55 or later.
CVE-2005-2088 affects Apache HTTP Server versions earlier than 1.3.34 and 2.0.x before 2.0.55, as well as Debian versions 3.0 and 3.1.
CVE-2005-2088 can enable web cache poisoning, XSS attacks, and bypassing web application firewalls.
Yes, CVE-2005-2088 is associated with HTTP request smuggling due to its exploitation of transfer encoding and content length in HTTP headers.