CVE-2005-2094
 
Severity Score
4.3
*CVSS v2
Exploit Likelihood
*EPSS
Affected Versions
*CPE
Public Exploits
0
*Multiple Sources
Exploited in Wild
-
*KEV
Decision
-
*SSVC
Descriptions
Sun SunONE web server 6.1 SP1 allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes SunONE to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
*Credits:
N/A
CVSS Scores
Attack Vector
Attack Complexity
Authentication
Confidentiality
Integrity
Availability
* Common Vulnerability Scoring System
SSVC
- Decision:-
Exploitation
Automatable
Tech. Impact
* Organization's Worst-case Scenario
Timeline
- 2005-06-30 CVE Reserved
- 2005-06-30 CVE Published
- 2024-06-06 EPSS Updated
- 2024-08-07 CVE Updated
- ---------- Exploited in Wild
- ---------- KEV Due Date
- ---------- First Exploit
CWE
CAPEC
References (5)
URL | Tag | Source |
---|---|---|
http://seclists.org/lists/bugtraq/2005/Jun/0025.html | Mailing List | |
http://securitytracker.com/id?1014369 | Vdb Entry | |
http://www.securiteam.com/securityreviews/5GP0220G0U.html | X_refsource_misc | |
http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf | X_refsource_misc | |
https://exchange.xforce.ibmcloud.com/vulnerabilities/42903 | Vdb Entry |
URL | Date | SRC |
---|
URL | Date | SRC |
---|
URL | Date | SRC |
---|
Affected Vendors, Products, and Versions
Vendor | Product | Version | Other | Status | ||||||
---|---|---|---|---|---|---|---|---|---|---|
Vendor | Product | Version | Other | Status | <-- --> | Vendor | Product | Version | Other | Status |
Sun Search vendor "Sun" | One Web Server Search vendor "Sun" for product "One Web Server" | 6.1 Search vendor "Sun" for product "One Web Server" and version "6.1" | sp1 |
Affected
|