[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

249982

 
 

909

 
 

195748

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

ALAS2TOMCAT8.5-2023-012 --- tomcat

ID: oval:org.secpod.oval:def:1701740Date: (C)2023-10-26   (M)2024-02-19
Class: PATCHFamily: unix




The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. A flaw was found in Apache Tomcat. The HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to the possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. The highest threat with this vulnerability is system availability

Platform:
Amazon Linux 2
Product:
tomcat
Reference:
ALAS2TOMCAT8.5-2023-012
CVE-2019-17569
CVE-2020-1935
CVE-2020-1938
CVE    3
CVE-2019-17569
CVE-2020-1935
CVE-2020-1938
CPE    2
cpe:/o:amazon:linux:2
cpe:/a:apache:tomcat

© SecPod Technologies