Description
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2733-1 | tomcat8 security update |
Debian DSA |
DSA-4952-1 | tomcat9 security update |
EUVD |
EUVD-2021-1563 | Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding. |
Github GHSA |
GHSA-4vww-mc66-62m6 | HTTP Request Smuggling in Apache Tomcat |
Ubuntu USN |
USN-5360-1 | Tomcat vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Tomcat
Subscribe
Tomee
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Mcafee
Subscribe
Epolicy Orchestrator
Subscribe
Oracle
Subscribe
Agile Plm
Subscribe
Communications Cloud Native Core Policy
Subscribe
Communications Cloud Native Core Service Communication Proxy
Subscribe
Communications Diameter Signaling Router
Subscribe
Communications Instant Messaging Server
Subscribe
Communications Policy Management
Subscribe
Communications Pricing Design Center
Subscribe
Communications Session Report Manager
Subscribe
Communications Session Route Manager
Subscribe
Graph Server And Client
Subscribe
Healthcare Translational Research
Subscribe
Hospitality Cruise Shipboard Property Management System
Subscribe
Instantis Enterprisetrack
Subscribe
Managed File Transfer
Subscribe
Mysql Enterprise Monitor
Subscribe
Sd-wan Edge
Subscribe
Secure Global Desktop
Subscribe
Utilities Testing Accelerator
Subscribe
Redhat
Subscribe
Jboss Enterprise Web Server
Subscribe
Jboss Fuse
Subscribe
Openshift Application Runtimes
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T23:42:19.203Z
Reserved: 2021-05-17T00:00:00.000Z
Link: CVE-2021-33037
No data.
Status : Modified
Published: 2021-07-12T15:15:08.400
Modified: 2024-11-21T06:08:10.320
Link: CVE-2021-33037
OpenCVE Enrichment
No data.
Weaknesses
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN