Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-91-1 | tomcat6 security update |
Debian DSA |
DSA-2897-1 | tomcat7 security update |
Debian DSA |
DSA-3530-1 | tomcat6 security update |
Github GHSA |
GHSA-j448-j653-r3vj | Apache Tomcat is vulnerable to HTTP request-smuggling |
Ubuntu USN |
USN-2130-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Fri, 11 Jul 2025 13:45:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
epss
|
epss
|
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T16:38:01.900Z
Reserved: 2013-06-12T00:00:00
Link: CVE-2013-4286
No data.
Status : Deferred
Published: 2014-02-26T14:55:08.160
Modified: 2025-04-11T00:51:21.963
Link: CVE-2013-4286
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
Github GHSA
Ubuntu USN