Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-42j3-498q-m6vp

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью

Описание

Improper Input Validation in Apache Tomcat

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

Ссылки

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 6.0.0, < 6.0.42

6.0.42

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 7.0.0, < 7.0.55

7.0.55

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 8.0.0, < 8.0.9

8.0.9

EPSS

Процентиль: 99%
0.83786
Высокий

Дефекты

CWE-20

Связанные уязвимости

ubuntu
больше 10 лет назад

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

redhat
больше 10 лет назад

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

nvd
больше 10 лет назад

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

debian
больше 10 лет назад

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apach ...

oracle-oval
около 10 лет назад

ELSA-2015-0991: tomcat6 security and bug fix update (MODERATE)

EPSS

Процентиль: 99%
0.83786
Высокий

Дефекты

CWE-20