Bug 237079 (CVE-2005-2090)

Summary: CVE-2005-2090 tomcat multiple content-length header poisioning
Product: [Other] Security Response Reporter: Mark J. Cox <mjc>
Component: vulnerabilityAssignee: Red Hat Product Security <security-response-team>
Status: CLOSED ERRATA QA Contact:
Severity: medium Docs Contact:
Priority: medium    
Version: unspecifiedKeywords: Security
Target Milestone: ---   
Target Release: ---   
Hardware: All   
OS: All   
Fixed In Version: Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of: Environment:
Last Closed: 2013-05-08 18:26:06 UTC Type: ---
Regression: --- Mount Type: ---
Documentation: --- CRM:
Verified Versions: Category: ---
oVirt Team: --- RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: --- Target Upstream Version:
Bug Depends On: 237086, 237088, 237089, 237090, 237109, 238402, 238574, 240208, 390331, 390341, 390351, 390361, 414311, 430730, 430731, 449337, 470236, 470237    
Bug Blocks: 444136    
Description Flags
the proposed patch none

Description Mark J. Cox 2007-04-19 11:50:17 UTC
From http://tomcat.apache.org/security-5.html

Fixed in Apache Tomcat 5.5.23

Information disclosure CVE-2005-2090

Requests with multiple content-length headers should be rejected as invalid.
When multiple components (firewalls, caches, proxies and Tomcat) process a
sequence of requests where one or more requests contain multiple content-length
headers and several components do not reject the request and make different
decisions as to which content-length leader to use an attacker can poision a
web-cache, perform an XSS attack and obtain senstive information from requests
other then their own. Tomcat now returns 400 for requests with multiple
content-length headers.

Affects: 5.0.0-5.0.HEAD, 5.5.0-5.5.22

Comment 2 Mark J. Cox 2007-04-19 11:53:21 UTC
Created attachment 152992 [details]
the proposed patch

Comment 3 Mark J. Cox 2007-04-23 10:35:30 UTC
advisory text: "Tomcat was found to accept multiple content-length headers in a
request.  This could allow attackers to poison a web-cache, bypass web
application firewall protection, or conduct cross-site scripting attacks. 

Comment 4 Jean-frederic Clere 2007-05-02 06:27:09 UTC
important: Directory traversal   CVE-2007-0450

Comment 5 Jean-frederic Clere 2007-05-02 06:33:01 UTC
That is a complex attack.

Comment 11 errata-xmlrpc 2010-08-04 21:32:26 UTC
This issue has been addressed in following products:

  Red Hat Certificate System 7.3

Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html

Comment 12 Vincent Danen 2013-05-08 18:26:06 UTC
Please see https://access.redhat.com/security/cve/CVE-2005-2090 for a list of other products that contain this fix.