Skip to content

Apache Tomcat is vulnerable to HTTP request-smuggling

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Feb 21, 2024

Package

maven org.apache.tomcat:tomcat (Maven)

Affected versions

< 6.0.39
>= 7.0.0, < 7.0.47
>= 8.0.0-RC1, < 8.0.0-RC3

Patched versions

6.0.39
7.0.47
8.0.0-RC3

Description

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

References

Published by the National Vulnerability Database Feb 26, 2014
Published to the GitHub Advisory Database May 14, 2022
Reviewed Aug 17, 2023
Last updated Feb 21, 2024

Severity

Moderate

Weaknesses

CVE ID

CVE-2013-4286

GHSA ID

GHSA-j448-j653-r3vj

Source code

Credits

Checking history
See something to contribute? Suggest improvements for this vulnerability.