Vulnerability Name:

CVE-2005-2090 (CCN-48211)

Assigned:2005-06-06
Published:2005-06-06
Updated:2019-04-15
Summary:Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
CVSS v3 Severity:3.7 Low (CCN CVSS v3.1 Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): High
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
2.6 Low (CCN CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N)
1.9 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:H/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): High
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-Other
Vulnerability Consequences:Gain Access
References:Source: CONFIRM
Type: Broken Link
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx

Source: CCN
Type: CA Security Response Blog, Jan 23 2009, 06:04 PM
CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities

Source: MITRE
Type: CNA
CVE-2005-2090

Source: CONFIRM
Type: Broken Link
http://docs.info.apple.com/article.html?artnum=306172

Source: HP
Type: Broken Link
SSRT071447

Source: APPLE
Type: Mailing List, Third Party Advisory
APPLE-SA-2007-07-31

Source: SUSE
Type: Third Party Advisory
SUSE-SR:2008:005

Source: MLIST
Type: Third Party Advisory
[Security-announce] 20080107 VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1

Source: CCN
Type: RHSA-2007-0326
Important: tomcat security update

Source: CCN
Type: RHSA-2007-0327
Important: tomcat security update

Source: CCN
Type: RHSA-2007-0328
Important: tomcat security update

Source: CCN
Type: RHSA-2007-0340
Important: tomcat security update

Source: CCN
Type: RHSA-2007-0360
Important: jbossas security update

Source: CCN
Type: RHSA-2007-1069
Moderate: tomcat security update for Red Hat Network Satellite Server

Source: CCN
Type: RHSA-2008-0261
Moderate: Red Hat Network Satellite Server security update

Source: CCN
Type: RHSA-2008-0524
Low: Red Hat Network Satellite Server security update

Source: CCN
Type: RHSA-2010-0602
Moderate: Red Hat Certificate System 7.3 security update

Source: CCN
Type: BugTraq Mailing List, Mon, 06 Jun 2005 19:09:04 +0300
A new whitepaper by Watchfire - HTTP Request Smuggling

Source: BUGTRAQ
Type: Mailing List, Third Party Advisory
20050606 A new whitepaper by Watchfire - HTTP Request Smuggling

Source: CCN
Type: SA26235
Mac OS X Security Update Fixes Multiple Vulnerabilities

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
26235

Source: CCN
Type: SA26660
Interstage Application Server Multiple Vulnerabilities

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
26660

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
27037

Source: CCN
Type: SA28365
VMware ESX Server and VirtualCenter Multiple Security Updates

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
28365

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
29242

Source: CCN
Type: SA30899
Sun Solaris 9 Tomcat Multiple Vulnerabilities

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
30899

Source: CCN
Type: SA30908
Sun Solaris 10 Tomcat Multiple Vulnerabilities

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
30908

Source: CCN
Type: SA33668
CA Cohesion Application Configuration Manager Apache Tomcat Multiple Vulnerabilities

Source: SECUNIA
Type: Permissions Required, Third Party Advisory
33668

Source: CCN
Type: SA40425
Novell ZENworks Linux Management Tomcat Multiple Vulnerabilities

Source: CCN
Type: SECTRACK ID: 1014365
Tomcat May Allow Remote Users to Conduct HTTP Response Smuggling Attacks

Source: SECTRACK
Type: Third Party Advisory, VDB Entry
1014365

Source: SUNALERT
Type: Broken Link
239312

Source: CONFIRM
Type: Third Party Advisory
http://support.avaya.com/elmodocs2/security/ASA-2007-206.htm

Source: CONFIRM
Type: Broken Link, Third Party Advisory
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540

Source: CCN
Type: Apache Web site
Apache Tomcat 4.x vulnerabilities

Source: CONFIRM
Type: Vendor Advisory
http://tomcat.apache.org/security-4.html

Source: CONFIRM
Type: Vendor Advisory
http://tomcat.apache.org/security-5.html

Source: CONFIRM
Type: Vendor Advisory
http://tomcat.apache.org/security-6.html

Source: CONFIRM
Type: Third Party Advisory
http://www.fujitsu.com/global/support/software/security/products-f/interstage-200703e.html

Source: CCN
Type: Novell Document ID: 7006398
Tomcat 5.0.28 in ZLM 7.3 subject to "Multiple Vendor Multiple HTTP Request Smuggling Vulnerabilities"

Source: REDHAT
Type: Third Party Advisory
RHSA-2007:0327

Source: REDHAT
Type: Third Party Advisory
RHSA-2007:0360

Source: REDHAT
Type: Third Party Advisory
RHSA-2008:0261

Source: MISC
Type: Exploit, Third Party Advisory
http://www.securiteam.com/securityreviews/5GP0220G0U.html

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20080108 VMSA-2008-0002 Low severity security update for VirtualCenter and ESX Server 3.0.2, and ESX 3.0.1

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20090124 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities

Source: BUGTRAQ
Type: Third Party Advisory, VDB Entry
20090127 CA20090123-01: Cohesion Tomcat Multiple Vulnerabilities (Updated - v1.1)

Source: BID
Type: Third Party Advisory, VDB Entry
13873

Source: CCN
Type: BID-13873
Multiple Vendor Multiple HTTP Request Smuggling Vulnerabilities

Source: BID
Type: Third Party Advisory, VDB Entry
25159

Source: CCN
Type: BID-25159
Apple Mac OS X 2007-007 Multiple Security Vulnerabilities

Source: VUPEN
Type: Permissions Required
ADV-2007-2732

Source: VUPEN
Type: Permissions Required
ADV-2007-3087

Source: VUPEN
Type: Permissions Required
ADV-2007-3386

Source: VUPEN
Type: Permissions Required
ADV-2008-0065

Source: VUPEN
Type: Permissions Required
ADV-2008-1979

Source: VUPEN
Type: Permissions Required
ADV-2009-0233

Source: MISC
Type: Third Party Advisory
http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf

Source: XF
Type: UNKNOWN
tomcat-header-request-smuggling(48211)

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190413 svn commit: r1857494 [15/20] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190325 svn commit: r1856174 [21/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190415 svn commit: r1857582 [16/22] - in /tomcat/site/trunk: docs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190319 svn commit: r1855831 [23/30] - in /tomcat/site/trunk: ./ docs/ xdocs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200203 svn commit: r1873527 [23/30] - /tomcat/site/trunk/docs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200213 svn commit: r1873980 [26/34] - /tomcat/site/trunk/docs/

Source: MLIST
Type: UNKNOWN
[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/

Source: OVAL
Type: Third Party Advisory
oval:org.mitre.oval:def:10499

Source: CCN
Type: CA20090123-01
Security Notice for Cohesion Tomcat

Source: SUSE
Type: SUSE-SR:2008:005
SUSE Security Summary Report

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:5.0.19:*:*:*:*:*:*:*

  • Configuration RedHat 1:
  • cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*

  • Configuration RedHat 2:
  • cpe:/o:redhat:enterprise_linux:5::client:*:*:*:*:*

  • Configuration RedHat 3:
  • cpe:/o:redhat:enterprise_linux:5::client_workstation:*:*:*:*:*

  • Configuration RedHat 4:
  • cpe:/o:redhat:enterprise_linux:5::server:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:tomcat:5.0.19:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
  • OR cpe:/a:apache:coyote_http_connector:1.0:*:*:*:*:*:*:*
  • OR cpe:/a:apache:coyote_http_connector:1.1:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:certificate_system:7.3:*:*:*:*:*:*:*
  • AND
  • cpe:/o:redhat:enterprise_linux:3::ws:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:*:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client_workstation:*:*:*:*:*
  • OR cpe:/o:redhat:enterprise_linux:5:*:client:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_developer_suite:3:*:*:*:*:*:*:*
  • OR cpe:/a:redhat:rhel_application_server:2:*:*:*:*:*:*:*

  • * Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.opensuse.security:def:20052090
    V
    CVE-2005-2090
    2015-11-16
    oval:org.mitre.oval:def:22631
    P
    ELSA-2007:0327: tomcat security update (Important)
    2014-05-26
    oval:org.mitre.oval:def:10499
    V
    Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
    2013-04-29
    oval:com.redhat.rhsa:def:20070327
    P
    RHSA-2007:0327: tomcat security update (Important)
    2008-03-20
    BACK
    apache tomcat 4.1.24
    apache tomcat 5.0.19
    apache tomcat 5.0.19
    apache tomcat 4.1.24
    apache coyote http connector 1.0
    apache coyote http connector 1.1
    redhat certificate system 7.3
    redhat enterprise linux 3
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat enterprise linux 5
    redhat rhel developer suite 3
    redhat rhel application server 2