Rapid7 Vulnerability & Exploit Database

Apache HTTPD: HTTP Request Spoofing (CVE-2005-2088)

Back to Search

Apache HTTPD: HTTP Request Spoofing (CVE-2005-2088)

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
07/05/2005
Created
07/25/2018
Added
04/12/2012
Modified
01/13/2022

Description

The affected asset is vulnerable to this vulnerability ONLY if Apache is used as a HTTP proxy. Review your web server configuration for validation. A flaw occured when using the Apache server as a HTTP proxy. A remote attacker could send a HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, causing Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request. This could allow the bypass of web application firewall protection or lead to cross-site scripting (XSS) attacks.

Solution(s)

  • apache-httpd-upgrade-2_0_55

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;