Tomcat Vulnerable to Web Cache Poisoning
Moderate severity
GitHub Reviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Sep 18, 2023
Package
Affected versions
>= 5.0.0, <= 5.0.19
>= 4.0.0, <= 4.1.24
Patched versions
None
Description
Published by the National Vulnerability Database
Jul 5, 2005
Published to the GitHub Advisory Database
May 1, 2022
Reviewed
Sep 18, 2023
Last updated
Sep 18, 2023
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."
References