Description
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Ubuntu USN |
USN-160-1 | Apache 2 vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T22:15:37.424Z
Reserved: 2005-06-30T00:00:00.000Z
Link: CVE-2005-2088
No data.
Status : Deferred
Published: 2005-07-05T04:00:00.000
Modified: 2025-04-03T01:03:51.193
Link: CVE-2005-2088
OpenCVE Enrichment
No data.
Weaknesses
Ubuntu USN