CVE-2005-2088

Source
https://nvd.nist.gov/vuln/detail/CVE-2005-2088
Import Source
https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2005-2088.json
JSON Data
https://api.osv.dev/v1/vulns/CVE-2005-2088
Related
Published
2005-07-05T04:00:00Z
Modified
2024-11-20T23:58:46Z
Summary
[none]
Details

The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

References

Affected packages

Debian:11 / apache2

Package

Name
apache2
Purl
pkg:deb/debian/apache2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.54-5

Ecosystem specific

{
    "urgency": "medium"
}

Debian:12 / apache2

Package

Name
apache2
Purl
pkg:deb/debian/apache2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.54-5

Ecosystem specific

{
    "urgency": "medium"
}

Debian:13 / apache2

Package

Name
apache2
Purl
pkg:deb/debian/apache2?arch=source

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
2.0.54-5

Ecosystem specific

{
    "urgency": "medium"
}