Description
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
Product(s):
- Apache HTTP Server
- Apache Software Foundation Apache HTTP Server 2.0.35
- Apache Software Foundation Apache HTTP Server 2.0.36
- Apache Software Foundation Apache HTTP Server 2.0.37
- Apache Software Foundation Apache HTTP Server 2.0.38
- Apache Software Foundation Apache HTTP Server 2.0.39
- Apache Software Foundation Apache HTTP Server 2.0.40
- Apache Software Foundation Apache HTTP Server 2.0.41
- Apache Software Foundation Apache HTTP Server 2.0.42
- Apache Software Foundation Apache HTTP Server 2.0.43
- Apache Software Foundation Apache HTTP Server 2.0.44
- Apache Software Foundation Apache HTTP Server 2.0.45
- Apache Software Foundation Apache HTTP Server 2.0.46
- Apache Software Foundation Apache HTTP Server 2.0.47
- Apache Software Foundation Apache HTTP Server 2.0.48
- Apache Software Foundation Apache HTTP Server 2.0.49
- Apache Software Foundation Apache HTTP Server 2.0.50
- Apache Software Foundation Apache HTTP Server 2.0.51
- Apache Software Foundation Apache HTTP Server 2.0.52
- Apache Software Foundation Apache HTTP Server 2.0.53
- Apache Software Foundation Apache HTTP Server 2.0.54
- Debian Debian Linux 3.0
- Debian Debian Linux 3.1
- Debian Linux 3.1 Alpha Edition
- Debian Linux 3.1 AMD64 Edition
- Debian Linux 3.1 ARM Edition
- Debian Linux 3.1 HPPA Edition
- Debian Linux 3.1 IA-32 Edition
- Debian Linux 3.1 IA-64 Edition
- Debian Linux 3.1 M68K Edition
- Debian Linux 3.1 MIPS Edition
- Debian Linux 3.1 MIPSEL Edition
- Debian Linux 3.1 PPC Edition
- Debian Linux 3.1 S-390 Edition
- Debian Linux 3.1 Sparc Edition
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-2088, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-2088 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.