4.3

CVE-2005-2090

Exploit
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheTomcat Version4.1.24
ApacheTomcat Version5.0.19
Zu dieser CVE wurde keine Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 81.97% 0.992
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 4.3 8.6 2.9
AV:N/AC:M/Au:N/C:N/I:P/A:N
Es wurden noch keine Informationen zu CWE veröffentlicht.
http://secunia.com/advisories/30899
Third Party Advisory
Permissions Required
http://secunia.com/advisories/30908
Third Party Advisory
Permissions Required
http://secunia.com/advisories/26235
Third Party Advisory
Permissions Required
http://www.securityfocus.com/bid/25159
Third Party Advisory
VDB Entry
http://seclists.org/lists/bugtraq/2005/Jun/0025.html
Third Party Advisory
Mailing List
http://secunia.com/advisories/26660
Third Party Advisory
Permissions Required
http://secunia.com/advisories/27037
Third Party Advisory
Permissions Required
http://secunia.com/advisories/28365
Third Party Advisory
Permissions Required
http://secunia.com/advisories/29242
Third Party Advisory
Permissions Required
http://secunia.com/advisories/33668
Third Party Advisory
Permissions Required
http://securitytracker.com/id?1014365
Third Party Advisory
VDB Entry
http://www.securityfocus.com/bid/13873
Third Party Advisory
VDB Entry