4.3

CVE-2005-2090

Exploit

Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

Data is provided by the National Vulnerability Database (NVD)
ApacheTomcat Version4.1.24
ApacheTomcat Version5.0.19
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Type Source Score Percentile
EPSS FIRST.org 81.99% 0.992
CVSS Metriken
Source Base Score Exploit Score Impact Score Vector string
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
http://secunia.com/advisories/30899
Third Party Advisory
Permissions Required
http://secunia.com/advisories/30908
Third Party Advisory
Permissions Required
http://secunia.com/advisories/26235
Third Party Advisory
Permissions Required
http://www.securityfocus.com/bid/25159
Third Party Advisory
VDB Entry
http://seclists.org/lists/bugtraq/2005/Jun/0025.html
Third Party Advisory
Mailing List
http://secunia.com/advisories/26660
Third Party Advisory
Permissions Required
http://secunia.com/advisories/27037
Third Party Advisory
Permissions Required
http://secunia.com/advisories/28365
Third Party Advisory
Permissions Required
http://secunia.com/advisories/29242
Third Party Advisory
Permissions Required
http://secunia.com/advisories/33668
Third Party Advisory
Permissions Required
http://securitytracker.com/id?1014365
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/13873
Third Party Advisory
VDB Entry