Vulnerability Note VU#768702
Multiple devices process HTTP requests inconsistently
Multiple interconnected devices process valid HTTP request headers inconsistently and in this may manner may allow a remote attacker to poison a cache, conduct cross-site scripting attacks, and hijack user sessions. Attackers may use these flaws to launch a class of attacks referred to as HTTP response splitting.
HTTP request headers contain parameters to describe an HTTP request, such as a request's size, type, source, and destination. Entities that handle HTTP data, such as web servers, web caches, and proxy servers, may not process HTTP requests in a consistent manner. A remote attacker may be able to leverage this inconsistency to force incorrect and possibly malicious data to be returned in response to a valid request.
By including multiple Content-length headers along with crafted, embedded carriage return-line feed (CRLF) pairs within the request data, the attacker may be able to send multiple requests through the web cache or browser cache in between the user and web server. The attacker is then able to control the content of the second response from the target in question, and can now perform the following attacks:
Web Cache Poisoning: A web cache may be poisoned into accepting data supplied by the attacker and indexing it as the true data for a given page.
Cross User Attacks: Multiple successive users may be served data supplied by the attacker, allowing the attacker to set or read session state and perform other tasks.
Page Hijacking: Some leakage of confidential user information may occur.
Browser Cache Poisoning: Similar to the web cache poisoning scenario, a user's web browser may cache attacker-controlled data.
In some cases, this may also lead to a reversal of the attack scenario if the user downloads content which, when loaded or executed, carries out the attack in a manner that delivers protected or otherwise inaccessible content to the attacker.
HTTP Response Splitting is outlined in depth in the Watchfire HTTP Response Splitting whitepaper.
A remote unauthenticated attacker may be able to inject malicious content into a web or browser cache, to perform cross-site scripting attacks, to hijack user and session data, or to bypass content protection mechanisms. These flaws are platform independent.
Apply an update
Do not follow unsolicited links
Systems Affected (Learn More)
|Vendor||Status||Date Notified||Date Updated|
|IBM Corporation||Affected||-||25 Jul 2005|
|Squid||Affected||-||25 Jul 2005|
CVSS Metrics (Learn More)
Thanks to Watchfire for reporting this vulnerability.
This document was written by Ken MacInnis.
- CVE IDs: CVE-2005-0175
- Date Public: 25 Jan 2005
- Date First Published: 04 Feb 2005
- Date Last Updated: 05 Mar 2007
- Severity Metric: 10.08
- Document Revision: 29
If you have feedback, comments, or additional information about this vulnerability, please send us email.