CVE DATABASE / CVE-2005-2088
CVE-2005-2088
CVSS 4.3 · MEDIUM
Summary
The Apache HTTP server before 1.3.34, and 2.0.x before 2.0.55, when acting as an HTTP proxy, allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Apache to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
CVSS 2.0 breakdown
| Base score | 4.3 (MEDIUM) |
| Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N |
| Attack vector | NETWORK |
| Attack complexity | MEDIUM |
| Confidentiality | NONE |
| Integrity | PARTIAL |
| Availability | NONE |
Weakness type (CWE)
Affected products
Apache http serverDebian debian linux
Check this CVE live
Use our free CVE Lookup tool for the latest NVD record, or browse the full CISA KEV catalog.
References
- http://docs.info.apple.com/article.html?artnum=302847
- http://lists.trustix.org/pipermail/tsl-announce/2005-October/000354.html
- http://marc.info/?l=apache-httpd-announce&m=112931556417329&w=3
- http://seclists.org/lists/bugtraq/2005/Jun/0025.html
- http://secunia.com/advisories/14530
- http://secunia.com/advisories/17319
- http://secunia.com/advisories/17487
- http://secunia.com/advisories/17813
- http://secunia.com/advisories/19072
- http://secunia.com/advisories/19073
- http://secunia.com/advisories/19185
- http://secunia.com/advisories/19317
- http://secunia.com/advisories/23074
- http://securityreason.com/securityalert/604
- http://securitytracker.com/id?1014323
Data: NIST NVD. NVD last modified 2026-04-16. Always verify against the vendor advisory before acting.