BEA Systems WebLogic 8.1 SP1 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes WebLogic to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
References
Configurations
History
20 Nov 2024, 23:58
Type | Values Removed | Values Added |
---|---|---|
References | () http://seclists.org/lists/bugtraq/2005/Jun/0025.html - | |
References | () http://securitytracker.com/id?1014366 - | |
References | () http://www.securiteam.com/securityreviews/5GP0220G0U.html - Exploit | |
References | () http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf - | |
References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/42901 - |
Information
Published : 2005-07-05 04:00
Updated : 2024-11-20 23:58
NVD link : CVE-2005-2092
Mitre link : CVE-2005-2092
CVE.ORG link : CVE-2005-2092
JSON object : View
Products Affected
bea
- weblogic_server
CWE