Apache Tomcat is vulnerable to HTTP request-smuggling
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Feb 21, 2024
Package
Affected versions
< 6.0.39
>= 7.0.0, < 7.0.47
>= 8.0.0-RC1, < 8.0.0-RC3
Patched versions
6.0.39
7.0.47
8.0.0-RC3
Description
Published by the National Vulnerability Database
Feb 26, 2014
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Aug 17, 2023
Last updated
Feb 21, 2024
Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.
References