CVE-2005-2092

BEA Systems WebLogic 8.1 SP1 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes WebLogic to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
Configurations

Configuration 1 (hide)

cpe:2.3:a:bea:weblogic_server:8.1:sp1:*:*:*:*:*:*

History

20 Nov 2024, 23:58

Type Values Removed Values Added
References () http://seclists.org/lists/bugtraq/2005/Jun/0025.html - () http://seclists.org/lists/bugtraq/2005/Jun/0025.html -
References () http://securitytracker.com/id?1014366 - () http://securitytracker.com/id?1014366 -
References () http://www.securiteam.com/securityreviews/5GP0220G0U.html - Exploit () http://www.securiteam.com/securityreviews/5GP0220G0U.html - Exploit
References () http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf - () http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/42901 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/42901 -

Information

Published : 2005-07-05 04:00

Updated : 2024-11-20 23:58


NVD link : CVE-2005-2092

Mitre link : CVE-2005-2092

CVE.ORG link : CVE-2005-2092


JSON object : View

Products Affected

bea

  • weblogic_server