National Vulnerability Database

National Vulnerability Database

National Vulnerability
Database

CVE-2005-2090 Detail

Current Description

Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

Source:  MITRE
View Analysis Description

Impact

CVSS v2.0 Severity and Metrics:

Base Score: 4.3 MEDIUM
Vector: (AV:N/AC:M/Au:N/C:N/I:P/A:N) (V2 legend)
Impact Subscore: 2.9
Exploitability Subscore: 8.6


Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (AU): None
Confidentiality (C): None
Integrity (I): Partial
Availability (A): None
Additional Information:
Allows unauthorized modification

References to Advisories, Solutions, and Tools

By selecting these links, you will be leaving NIST webspace. We have provided these links to other web sites because they may have information that would be of interest to you. No inferences should be drawn on account of other sites being referenced, or not, from this page. There may be other web sites that are more appropriate for your purpose. NIST does not necessarily endorse the views expressed, or concur with the facts presented on these sites. Further, NIST does not endorse any commercial products that may be mentioned on these sites. Please address comments about this page to nvd@nist.gov.

Hyperlink Resource
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx Broken Link
http://docs.info.apple.com/article.html?artnum=306172 Broken Link
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795 Broken Link
http://lists.apple.com/archives/security-announce//2007/Jul/msg00004.html Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html Third Party Advisory
http://lists.vmware.com/pipermail/security-announce/2008/000003.html Third Party Advisory
http://seclists.org/lists/bugtraq/2005/Jun/0025.html Mailing List Third Party Advisory
http://securitytracker.com/id?1014365 Third Party Advisory VDB Entry
http://sunsolve.sun.com/search/document.do?assetkey=1-26-239312-1 Broken Link
http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm Third Party Advisory
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540 Broken Link Third Party Advisory
http://tomcat.apache.org/security-4.html Vendor Advisory
http://tomcat.apache.org/security-5.html Vendor Advisory
http://tomcat.apache.org/security-6.html Vendor Advisory
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200703e.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0327.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2007-0360.html Third Party Advisory
http://www.redhat.com/support/errata/RHSA-2008-0261.html Third Party Advisory
http://www.securiteam.com/securityreviews/5GP0220G0U.html Exploit Third Party Advisory
http://www.securityfocus.com/archive/1/485938/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/500396/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/500412/100/0/threaded Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/13873 Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/25159 Third Party Advisory VDB Entry
http://www.vupen.com/english/advisories/2007/2732 Permissions Required
http://www.vupen.com/english/advisories/2007/3087 Permissions Required
http://www.vupen.com/english/advisories/2007/3386 Permissions Required
http://www.vupen.com/english/advisories/2008/0065 Permissions Required
http://www.vupen.com/english/advisories/2008/1979/references Permissions Required
http://www.vupen.com/english/advisories/2009/0233 Permissions Required
http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf Third Party Advisory
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A10499 Third Party Advisory

Technical Details

Vulnerability Type (View All)

Known Affected Software Configurations Switch to CPE 2.2

Configuration 1 ( hide )
 cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
     Show Matching CPE(s)
 cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*
     Show Matching CPE(s)


Change History

8 change records found - show changes

Quick Info

CVE Dictionary Entry:
CVE-2005-2090
NVD Published Date:
07/05/2005
NVD Last Modified:
04/15/2019