apache -- http request smuggling
Description:
A Watchfire whitepaper reports an vulnerability in the
Apache webserver. The vulnerability can be exploited by
malicious people causing cross site scripting, web cache
poisoining, session hijacking and most importantly the
ability to bypass web application firewall protection.
Exploiting this vulnerability requires multiple carefully
crafted HTTP requests, taking advantage of an caching server,
proxy server, web application firewall etc. This only affects
installations where Apache is used as HTTP proxy in
combination with the following web servers:
- IIS/6.0 and 5.0
- Apache 2.0.45 (as web server)
- apache 1.3.29
- WebSphere 5.1 and 5.0
- WebLogic 8.1 SP1
- Oracle9iAS web server 9.0.2
- SunONE web server 6.1 SP4
References:
Affects:
- apache <1.3.33_2
- apache >2.* <2.0.54_1
- apache >2.1.0 <2.1.6_1
- apache+ssl <1.3.33.1.55_1
- apache+mod_perl <1.3.33_3
- apache+mod_ssl <1.3.33+2.8.22_1
- apache+mod_ssl+ipv6 <1.3.33+2.8.22_1
- apache+mod_ssl+mod_accel <1.3.33+2.8.22_1
- apache+mod_ssl+mod_accel+ipv6 <1.3.33+2.8.22_1
- apache+mod_ssl+mod_accel+mod_deflate <1.3.33+2.8.22_1
- apache+mod_ssl+mod_accel+mod_deflate+ipv6 <1.3.33+2.8.22_1
- apache+mod_ssl+mod_deflate <1.3.33+2.8.22_1
- apache+mod_ssl+mod_deflate+ipv6 <1.3.33+2.8.22_1
- apache+mod_ssl+mod_snmp <1.3.33+2.8.22_1
- apache+mod_ssl+mod_snmp+mod_accel <1.3.33+2.8.22_1
- apache+mod_ssl+mod_snmp+mod_accel+ipv6 <1.3.33+2.8.22_1
- apache+mod_ssl+mod_snmp+mod_deflate <1.3.33+2.8.22_1
- apache+mod_ssl+mod_snmp+mod_deflate+ipv6 <1.3.33+2.8.22_1
- apache+mod_ssl+mod_snmp+mod_accel+mod_deflate+ipv6 <1.3.33+2.8.22_1
- apache_fp >0
- apache+ipv6 >0
- ru-apache <1.3.34+30.22
- ru-apache+mod_ssl <1.3.34+30.22+2.8.25
portaudit: apache -- http request smuggling
Disclaimer: The data contained on this page is derived from the VuXML document,
please refer to the the original document for copyright information. The author of
portaudit makes no claim of authorship or ownership of any of the information contained herein.
If you have found a vulnerability in a FreeBSD port not listed in the
database, please contact the
FreeBSD Security Officer. Refer to
"FreeBSD Security
Information" for more information.
Oliver Eikemeier <eik@FreeBSD.org>