Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

Project Subscriptions

Vendors Products
Enterprise Linux Subscribe
Jboss Bpms Subscribe
Jboss Brms Subscribe
Jboss Data Grid Subscribe
Jboss Data Virtualization Subscribe
Jboss Enterprise Application Platform Subscribe
Jboss Enterprise Portal Platform Subscribe
Jboss Enterprise Web Server Subscribe
Jboss Fuse Service Works Subscribe
Jboss Operations Network Subscribe
Advisories
Source ID Title
Debian DLA Debian DLA DLA-91-1 tomcat6 security update
Debian DSA Debian DSA DSA-2897-1 tomcat7 security update
Debian DSA Debian DSA DSA-3530-1 tomcat6 security update
Github GHSA Github GHSA GHSA-j448-j653-r3vj Apache Tomcat is vulnerable to HTTP request-smuggling
Ubuntu USN Ubuntu USN USN-2130-1 Tomcat vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

References
Link Providers
http://advisories.mageia.org/MGASA-2014-0148.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=141390017113542&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=144498216801440&w=2 cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-0343.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-0344.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2014-0345.html cve-icon cve-icon
http://seclists.org/fulldisclosure/2014/Dec/23 cve-icon cve-icon
http://secunia.com/advisories/57675 cve-icon cve-icon
http://secunia.com/advisories/59036 cve-icon cve-icon
http://secunia.com/advisories/59675 cve-icon cve-icon
http://secunia.com/advisories/59722 cve-icon cve-icon
http://secunia.com/advisories/59724 cve-icon cve-icon
http://secunia.com/advisories/59733 cve-icon cve-icon
http://secunia.com/advisories/59873 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1521829 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1521854 cve-icon cve-icon
http://svn.apache.org/viewvc?view=revision&revision=1552565 cve-icon cve-icon
http://tomcat.apache.org/security-6.html cve-icon cve-icon
http://tomcat.apache.org/security-7.html cve-icon cve-icon
http://tomcat.apache.org/security-8.html cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21667883 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21675886 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21677147 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21678113 cve-icon cve-icon
http://www-01.ibm.com/support/docview.wss?uid=swg21678231 cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3530 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2015:052 cve-icon cve-icon
http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html cve-icon cve-icon
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html cve-icon cve-icon
http://www.securityfocus.com/archive/1/534161/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/65773 cve-icon cve-icon
http://www.ubuntu.com/usn/USN-2130-1 cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2014-0012.html cve-icon cve-icon
https://bugzilla.redhat.com/show_bug.cgi?id=1069921 cve-icon cve-icon
https://h20564.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c04851013 cve-icon cve-icon
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2013-4286 cve-icon
https://rhn.redhat.com/errata/RHSA-2014-0686.html cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2013-4286 cve-icon
History

Fri, 11 Jul 2025 13:45:00 +0000

Type Values Removed Values Added
Metrics epss

{'score': 0.30559}

epss

{'score': 0.25588}


Projects

Sign in to view the affected projects.

cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-06T16:38:01.900Z

Reserved: 2013-06-12T00:00:00

Link: CVE-2013-4286

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Deferred

Published: 2014-02-26T14:55:08.160

Modified: 2025-04-11T00:51:21.963

Link: CVE-2013-4286

cve-icon Redhat

Severity : Moderate

Publid Date: 2014-02-25T00:00:00Z

Links: CVE-2013-4286 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses