Description
BEA Systems WebLogic 8.1 SP1 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes WebLogic to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
Product(s):
- BEA Systems WebLogic Server 8.1 SP1
- BEA Systems WebLogic Express 8.1 SP1
- BEA Systems WebLogic Server 8.1 SP1 Win32
Question to Ask Vendors:
- Can you confirm whether your systems are affected by CVE-2005-2092, and if so, what steps are you currently taking to mitigate this vulnerability?
- What is your estimated timeline for fully resolving CVE-2005-2092 in your products or services, and how will you communicate updates on this issue to us as your customer?
Recommended Actions:
- Check out the advisory links provided below.