CVE-2005-2088

Public Exploit

Description

The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

Category

4.3
CVSS
Severity: Medium
CVSS 2.0 •
EPSS 81.40% Top 5%
Vendor Advisory novell.com Vendor Advisory redhat.com Vendor Advisory novell.com Vendor Advisory ubuntu.com Vendor Advisory trustix.org Vendor Advisory ibm.com Vendor Advisory slackware.com Vendor Advisory securityfocus.com Vendor Advisory mandriva.com Vendor Advisory apple.com Vendor Advisory hp.com Vendor Advisory ibm.com Vendor Advisory debian.org Vendor Advisory debian.org Vendor Advisory sun.com Vendor Advisory sun.com Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org Vendor Advisory apache.org
Affected: n/a n/a
Published at:
Updated at:

References

Link Tags
http://secunia.com/advisories/17319 third party advisory not applicable
http://www.novell.com/linux/security/advisories/2005_18_sr.html vendor advisory broken link
http://www.redhat.com/support/errata/RHSA-2005-582.html broken link third party advisory vendor advisory
http://www.novell.com/linux/security/advisories/2005_46_apache.html vendor advisory broken link
http://www.ubuntu.com/usn/usn-160-2 vendor advisory broken link
http://www.vupen.com/english/advisories/2005/2140 permissions required vdb entry broken link
http://secunia.com/advisories/17813 third party advisory not applicable
http://support.avaya.com/elmodocs2/security/ASA-2006-081.htm third party advisory
http://www.vupen.com/english/advisories/2005/2659 permissions required vdb entry broken link
http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html vendor advisory broken link
http://www-1.ibm.com/support/search.wss?rs=0&q=PK13959&apar=only broken link third party advisory vendor advisory
http://slackware.com/security/viewer.php?l=slackware-security&y=2005&m=slackware-security.600000 third party advisory vendor advisory
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A840 signature vdb entry third party advisory broken link
http://www.vupen.com/english/advisories/2006/1018 permissions required vdb entry broken link
http://www.securityfocus.com/archive/1/428138/100/0/threaded broken link vdb entry third party advisory vendor advisory
http://www.mandriva.com/security/advisories?name=MDKSA-2005:130 third party advisory vendor advisory
http://www.apache.org/dist/httpd/CHANGES_1.3 broken link vendor advisory
http://secunia.com/advisories/19185 third party advisory not applicable
http://www.apache.org/dist/httpd/CHANGES_2.0 broken link vendor advisory
http://secunia.com/advisories/14530 third party advisory not applicable
http://www.vupen.com/english/advisories/2006/4680 permissions required vdb entry broken link
http://securityreason.com/securityalert/604 third party advisory exploit
http://secunia.com/advisories/17487 third party advisory not applicable
http://secunia.com/advisories/19317 third party advisory not applicable
http://docs.info.apple.com/article.html?artnum=302847 vendor advisory broken link
http://www1.itrc.hp.com/service/cki/docDisplay.do?docId=c00612828 vendor advisory broken link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1629 signature vdb entry third party advisory broken link
http://securitytracker.com/id?1014323 vdb entry third party advisory broken link
http://secunia.com/advisories/19072 third party advisory not applicable
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1237 signature vdb entry third party advisory broken link
http://www.securiteam.com/securityreviews/5GP0220G0U.html broken link exploit
http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf broken link
http://www-1.ibm.com/support/search.wss?rs=0&q=PK16139&apar=only broken link third party advisory vendor advisory
http://www.debian.org/security/2005/dsa-805 mailing list third party advisory vendor advisory
http://secunia.com/advisories/19073 third party advisory not applicable
http://marc.info/?l=apache-httpd-announce&m=112931556417329&w=3 third party advisory mailing list
http://www.securityfocus.com/bid/15647 vdb entry third party advisory broken link
https://secure-support.novell.com/KanisaPlatform/Publishing/741/3222109_f.SAL_Public.html broken link
http://www.securityfocus.com/bid/14106 vdb entry third party advisory broken link
http://seclists.org/lists/bugtraq/2005/Jun/0025.html issue tracking mailing list third party advisory
http://www.debian.org/security/2005/dsa-803 mailing list third party advisory vendor advisory
http://secunia.com/advisories/23074 third party advisory not applicable
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102197-1 vendor advisory broken link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A1526 signature vdb entry third party advisory broken link
http://sunsolve.sun.com/search/document.do?assetkey=1-26-102198-1 vendor advisory broken link
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11452 signature vdb entry third party advisory broken link
http://www.vupen.com/english/advisories/2006/0789 permissions required vdb entry broken link
https://lists.apache.org/thread.html/54a42d4b01968df1117cea77fc53d6beb931c0e05936ad02af93e9ac%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/5df9bfb86a3b054bb985a45ff9250b0332c9ecc181eec232489e7f79%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/r0276683d8e1e07153fc8642618830ac0ade85b9ae0dc7b07f63bb8fc%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/r8828e649175df56f1f9e3919938ac7826128525426e2748f0ab62feb%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/rf6449464fd8b7437704c55f88361b66f12d5b5f90bcce66af4be4ba9%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/re895fc1736d25c8cf57e102c871613b8aeec9ea26fd8a44e7942b5ab%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/rd65d8ba68ba17e7deedafbf5bb4899f2ae4dad781d21b931c2941ac3%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/r2cb985de917e7da0848c440535f65a247754db8b2154a10089e4247b%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/r9e8622254184645bc963a1d47c5d47f6d5a36d6f080d8d2c43b2b142%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/r734a07156abf332d5ab27fb91d9d962cacfef4f3681e44056f064fa8%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/r9f93cf6dde308d42a9c807784e8102600d0397f5f834890708bf6920%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory
https://lists.apache.org/thread.html/r5001ecf3d6b2bdd0b732e527654248abb264f08390045d30709a92f6%40%3Ccvs.httpd.apache.org%3E mailing list vendor advisory

Frequently Asked Questions

What is the severity of CVE-2005-2088?
CVE-2005-2088 has been scored as a medium severity vulnerability.
How to fix CVE-2005-2088?
To fix CVE-2005-2088, make sure you are using an up-to-date version of the affected component(s) by checking the vendor release notes. As for now, there are no other specific guidelines available.
Is CVE-2005-2088 being actively exploited in the wild?
It is possible that CVE-2005-2088 is being exploited or will be exploited in a near future based on public information. According to its EPSS score, there is a ~81% probability that this vulnerability will be exploited by malicious actors in the next 30 days.
This platform uses data from the NIST NVD, MITRE CVE, MITRE CWE, First.org and CISA KEV but is not endorsed or certified by these entities. CVE is a registred trademark of the MITRE Corporation and the authoritative source of CVE content is MITRE's CVE web site. CWE is a registred trademark of the MITRE Corporation and the authoritative source of CWE content is MITRE's CWE web site.
© 2025 Under My Watch. All Rights Reserved.