4.3 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
MEDIUM
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:M/Au:N/C:N/I:P/A:N
0.963 High
EPSS
Percentile
99.5%
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting
as an HTTP proxy, allows remote attackers to poison the web cache, bypass
web application firewall protection, and conduct XSS attacks via an HTTP
request with both a “Transfer-Encoding: chunked” header and a
Content-Length header, which causes Apache to incorrectly handle and
forward the body of the request in a way that causes the receiving server
to process it as a separate HTTP request, aka “HTTP Request Smuggling.”
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
ubuntu | 6.06 | noarch | apache | < 1.3.34-2ubuntu0.1 | UNKNOWN |
ubuntu | 6.10 | noarch | apache | < 1.3.34-4ubuntu1 | UNKNOWN |
ubuntu | 7.04 | noarch | apache | < 1.3.34-4ubuntu1 | UNKNOWN |
ubuntu | 6.06 | noarch | apache2 | < 2.0.55-4ubuntu2.2 | UNKNOWN |
ubuntu | 6.10 | noarch | apache2 | < 2.0.55-4ubuntu4.1 | UNKNOWN |
ubuntu | 7.04 | noarch | apache2 | < 2.2.3-3.2ubuntu0.1 | UNKNOWN |