[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

250108

 
 

909

 
 

196064

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2TOMCAT9-2023-005 --- tomcat

ID: oval:org.secpod.oval:def:1701671Date: (C)2023-10-26   (M)2024-02-19
Class: PATCHFamily: unix




The simplified implementation of blocking reads and writes introduced in Tomcat 10 and back-ported to Tomcat 9.0.47 onwards exposed a long standing concurrency bug in Apache Tomcat 10.1.0 to 10.1.0-M12, 10.0.0-M1 to 10.0.18, 9.0.0-M1 to 9.0.60 and 8.5.0 to 8.5.77 that could cause client connections to share an Http11Processor instance resulting in responses, or part responses, to be received by the wrong client. If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false , Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header

Platform:
Amazon Linux 2
Product:
tomcat
Reference:
ALAS2TOMCAT9-2023-005
CVE-2021-43980
CVE-2022-42252
CVE    2
CVE-2022-42252
CVE-2021-43980
CPE    2
cpe:/o:amazon:linux:2
cpe:/a:apache:tomcat

© SecPod Technologies