SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Sun ONE/iPlanet Web Server Vendors:   Sun
SunONE Web Server May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
SecurityTracker Alert ID:  1014369
SecurityTracker URL:  http://securitytracker.com/id/1014369
CVE Reference:   CVE-2005-2094   (Links to External Site)
Updated:  Jun 24 2008
Original Entry Date:  Jul 3 2005
Impact:   Modification of user information
Exploit Included:  Yes  
Version(s): 6.1 SP4
Description:   A potential vulnerability was reported in SunONE Web Server when used in conjunction with certain gateway and proxy servers. A remote user can conduct HTTP request smuggling attacks.

If the web server is used in conjunction with a proxy server or application gateway (e.g., cache, firewall) and if there is an input validation vulnerability in the web server or one of its applications, then a remote user can use HTTP request smuggling techniques to hijack a target user's request or conduct a variation of a cross-site scripting attack against a target user.

A remote user can send multiple HTTP requests with specially crafted HTTP headers to the target server via the proxy/gateway server. The requests may be interpreted differently by the target server than by the proxy/gateway server. As a result, unexpected results may occur. A remote user may be able to poison an intermediate cache, bypass application-level security features within an intermediate proxy/gateway server, or conduct cross-site scripting attacks against target users.

Networks that use SunONE Web Server in conjunction with Apache, Internet Security and Acceleration Server, DeleGate, or SunONE web cache may be affected. Other configurations may also be affected.

This vulnerability was reported by Watchfire.

A description of HTTP request smuggling attacks is available at:

http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf

Impact:   Depending on the associated proxy/gateway server used in conjunction with the target system, a remote user may be able to poison an intermediate cache, bypass application-level security features within an intermediate proxy/gateway server, or conduct cross-site scripting attacks against target users.
Solution:   No solution was available at the time of this entry.
Vendor URL:  www.sun.com/ (Links to External Site)
Cause:   State error
Underlying OS:  Linux (Red Hat Enterprise), UNIX (AIX), UNIX (HP/UX), UNIX (Solaris - SunOS), Windows (2000), Windows (XP)

Message History:   None.


 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2019, SecurityGlobal.net LLC