Lucene search

K
freebsdFreeBSD651996E0-FE07-11D9-8329-000E0C2E438A
HistoryJul 25, 2005 - 12:00 a.m.

apache -- http request smuggling

2005-07-2500:00:00
vuxml.freebsd.org
25

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.963

Percentile

99.6%

A Watchfire whitepaper reports an vulnerability in the
Apache webserver. The vulnerability can be exploited by
malicious people causing cross site scripting, web cache
poisoining, session hijacking and most importantly the
ability to bypass web application firewall protection.
Exploiting this vulnerability requires multiple carefully
crafted HTTP requests, taking advantage of an caching server,
proxy server, web application firewall etc. This only affects
installations where Apache is used as HTTP proxy in
combination with the following web servers:

IIS/6.0 and 5.0
Apache 2.0.45 (as web server)
apache 1.3.29
WebSphere 5.1 and 5.0
WebLogic 8.1 SP1
Oracle9iAS web server 9.0.2
SunONE web server 6.1 SP4

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.963

Percentile

99.6%