CVE-2005-2090 Affecting tomcat5-jsp-2.0-api-javadoc package, versions <0:5.5.23-0jpp.1.0.3.el5


Severity

Recommended
high

Based on Oracle Linux security rating.

Threat Intelligence

EPSS
96.01% (100th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-ORACLE5-TOMCAT5JSP20APIJAVADOC-2447330
  • published10 Apr 2022
  • disclosed5 Jul 2005

Introduced: 5 Jul 2005

CVE-2005-2090  (opens in a new tab)

How to fix?

Upgrade Oracle:5 tomcat5-jsp-2.0-api-javadoc to version 0:5.5.23-0jpp.1.0.3.el5 or higher.
This issue was patched in ELSA-2007-0327.

NVD Description

Note: Versions mentioned in the description apply only to the upstream tomcat5-jsp-2.0-api-javadoc package and not the tomcat5-jsp-2.0-api-javadoc package as distributed by Oracle. See How to fix? for Oracle:5 relevant fixed versions and status.

Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."

References

CVSS Scores

version 3.1