Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
Project Subscriptions
| Vendors | Products |
|---|---|
|
Apache
Subscribe
|
|
|
Debian
Subscribe
|
Debian Linux
Subscribe
|
|
Mcafee
Subscribe
|
Epolicy Orchestrator
Subscribe
|
|
Oracle
Subscribe
|
Agile Plm
Subscribe
Communications Cloud Native Core Policy
Subscribe
Communications Cloud Native Core Service Communication Proxy
Subscribe
Communications Diameter Signaling Router
Subscribe
Communications Instant Messaging Server
Subscribe
Communications Policy Management
Subscribe
Communications Pricing Design Center
Subscribe
Communications Session Report Manager
Subscribe
Communications Session Route Manager
Subscribe
Graph Server And Client
Subscribe
Healthcare Translational Research
Subscribe
Hospitality Cruise Shipboard Property Management System
Subscribe
Instantis Enterprisetrack
Subscribe
Managed File Transfer
Subscribe
Mysql Enterprise Monitor
Subscribe
Sd-wan Edge
Subscribe
Secure Global Desktop
Subscribe
Utilities Testing Accelerator
Subscribe
|
|
Redhat
Subscribe
|
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2733-1 | tomcat8 security update |
Debian DSA |
DSA-4952-1 | tomcat9 security update |
EUVD |
EUVD-2021-1563 | Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding. |
Github GHSA |
GHSA-4vww-mc66-62m6 | HTTP Request Smuggling in Apache Tomcat |
Ubuntu USN |
USN-5360-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Projects
Sign in to view the affected projects.
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T23:42:19.203Z
Reserved: 2021-05-17T00:00:00
Link: CVE-2021-33037
No data.
Status : Modified
Published: 2021-07-12T15:15:08.400
Modified: 2024-11-21T06:08:10.320
Link: CVE-2021-33037
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN