HTTP request smuggling vulnerability in Pound before 1.9.4 allows remote attackers to poison web caches, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with conflicting Content-length and Transfer-encoding headers.
References
Configurations
History
21 Nov 2024, 00:02
Type | Values Removed | Values Added |
---|---|---|
References | () http://secunia.com/advisories/18367 - Vendor Advisory | |
References | () http://secunia.com/advisories/18381 - Vendor Advisory | |
References | () http://secunia.com/advisories/20215 - Vendor Advisory | |
References | () http://secunia.com/advisories/20510 - Vendor Advisory | |
References | () http://www.apsis.ch/pound/pound_list/archive/2005/2005-10/1129827166000/index_html?fullMode=1#1129827166000 - | |
References | () http://www.debian.org/security/2005/dsa-934 - | |
References | () http://www.gentoo.org/security/en/glsa/glsa-200606-05.xml - | |
References | () http://www.novell.com/linux/security/advisories/2006_05_19.html - |
Information
Published : 2005-11-22 20:03
Updated : 2024-11-21 00:02
NVD link : CVE-2005-3751
Mitre link : CVE-2005-3751
CVE.ORG link : CVE-2005-3751
JSON object : View
Products Affected
apsis
- pound
CWE