HTTP Request Smuggling in Apache Tomcat
Moderate severity
GitHub Reviewed
Published
Aug 13, 2021
to the GitHub Advisory Database
•
Updated Mar 11, 2024
Package
Affected versions
>= 10.0.0-M1, < 10.0.7
>= 9.0.0-M1, < 9.0.48
>= 8.5.0, < 8.5.68
Patched versions
10.0.7
9.0.48
8.5.68
Description
Published by the National Vulnerability Database
Jul 12, 2021
Reviewed
Jul 13, 2021
Published to the GitHub Advisory Database
Aug 13, 2021
Last updated
Mar 11, 2024
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
References