SecurityTracker.com
    Home    |    View Topics    |    Search    |    Contact Us    |   

SecurityTracker
Archives


 


Category:   Application (Web Server/CGI)  >   Apache Tomcat Vendors:   Apache Software Foundation
(Sun Issues Fix for Solaris) Tomcat May Allow Remote Users to Conduct HTTP Response Smuggling Attacks
SecurityTracker Alert ID:  1020414
SecurityTracker URL:  http://securitytracker.com/id/1020414
CVE Reference:   CVE-2005-2090   (Links to External Site)
Updated:  Jul 2 2008
Original Entry Date:  Jul 2 2008
Impact:   Modification of user information
Fix Available:  Yes  Vendor Confirmed:  Yes  
Version(s): 4.1.24, 5.0.19
Description:   A potential vulnerability was reported in Apache Tomcat when used in conjunction with certain gateway and proxy servers. A remote user can conduct HTTP request smuggling attacks.

If the web server is used in conjunction with a proxy server or application gateway (e.g., cache, firewall) and if there is an input validation vulnerability in the web server or one of its applications, then a remote user can use HTTP request smuggling techniques to hijack a target user's request or conduct a variation of a cross-site scripting attack against a target user.

A remote user can send multiple HTTP requests with specially crafted HTTP headers to the target server via the proxy/gateway server. The requests may be interpreted differently by the target server than by the proxy/gateway server. As a result, unexpected results may occur. A remote user may be able to poison an intermediate cache, bypass application-level security features within an intermediate proxy/gateway server, or conduct cross-site scripting attacks against target users.

Networks that use Tomcat in conjunction with Internet Security and Acceleration Server, DeleGate, or Sun ONE proxy server may be affected. Other configurations may also be affected.

This vulnerability was reported by Watchfire.

A description of HTTP request smuggling attacks is available at:

http://www.watchfire.com/resources/HTTP-Request-Smuggling.pdf

Impact:   Depending on the associated proxy/gateway server used in conjunction with the target system, a remote user may be able to poison an intermediate cache, bypass application-level security features within an intermediate proxy/gateway server, or conduct cross-site scripting attacks against target users.
Solution:   Sun has issued a fix for Tomcat on Solaris.

SPARC Platform

* Solaris 10 with patch 122911-12 or later

x86 Platform

* Solaris 10 with patch 122912-12 or later

A fix for Solaris 9 is pending.

The Sun advisory is available at:

http://sunsolve.sun.com/search/document.do?assetkey=1-66-239312-1

Vendor URL:  jakarta.apache.org/ (Links to External Site)
Cause:   State error
Underlying OS:  UNIX (Solaris - SunOS)
Underlying OS Comments:  9, 10

Message History:   This archive entry is a follow-up to the message listed below.
Jul 3 2005 Tomcat May Allow Remote Users to Conduct HTTP Response Smuggling Attacks



 Source Message Contents



[Original Message Not Available for Viewing]


Go to the Top of This SecurityTracker Archive Page





Home   |    View Topics   |    Search   |    Contact Us

This web site uses cookies for web analytics. Learn More

Copyright 2021, SecurityGlobal.net LLC