Apache Tomcat 5.0.x <= 5.0.30 / 5.5.x < 5.5.23 Content-Length HTTP Request Smuggling

This script is Copyright (C) 2011-2016 Tenable Network Security, Inc.

Synopsis :

The remote web server is affected by an HTTP request smuggling

Description :

According to its self-reported version number, the instance of Apache
Tomcat listening on the remote host is 5.0.x equal to or prior to
5.0.30 or 5.5.x prior to 5.5.23. It is, therefore, affected by an HTTP
request smuggling vulnerability.

Requests containing multiple 'content-length' headers are not rejected
as invalid. This error can allow web-cache poisoning, cross-site
scripting attacks and information disclosure.

Note that Nessus has not tested for this issue but has instead relied
only on the application's self-reported version number.

See also :


Solution :

Upgrade to Apache Tomcat version 5.5.23 or later. Alternatively, use
the latest SVN source for 5.0.x. SVN revision number 513079 fixes the

Risk factor :

Medium / CVSS Base Score : 4.3
CVSS Temporal Score : 4.3
Public Exploit Available : false

Family: Web Servers

Nessus Plugin ID: 17727 ()

Bugtraq ID: 13873

CVE ID: CVE-2005-2090

Ready to Amp Up Your Nessus Experience?

Get Nessus Professional to scan unlimited IPs, run compliance checks & more

Buy Nessus Professional Now