Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2013-4286

Опубликовано: 25 фев. 2014
Источник: redhat
CVSS2: 5.8
EPSS Средний

Описание

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

It was found that when Tomcat / JBoss Web processed a series of HTTP requests in which at least one request contained either multiple content-length headers, or one content-length header with a chunked transfer-encoding header, Tomcat / JBoss Web would incorrectly handle the request. A remote attacker could use this flaw to poison a web cache, perform cross-site scripting (XSS) attacks, or obtain sensitive information from other requests.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Toolset 2.0devtoolset-2-tomcatNot affected
Red Hat Enterprise Linux 5tomcat5Will not fix
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Web Server 1othersWill not fix
Red Hat JBoss Enterprise Web Server 1tomcat5Will not fix
Red Hat JBoss Enterprise Web Server 1tomcat6Will not fix
Red Hat JBoss Operations Network 3jbosswebAffected
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2014:042923.04.2014
Red Hat Enterprise Linux 7tomcatFixedRHSA-2014:068610.06.2014
Red Hat JBoss BPMS 6.0jbosswebFixedRHSA-2014:037303.04.2014

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1069921tomcat: multiple content-length header poisoning flaws

EPSS

Процентиль: 96%
0.24915
Средний

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 11 лет назад

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

nvd
больше 11 лет назад

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090.

debian
больше 11 лет назад

Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-R ...

github
около 3 лет назад

Apache Tomcat is vulnerable to HTTP request-smuggling

oracle-oval
почти 11 лет назад

ELSA-2014-0686: tomcat security update (IMPORTANT)

EPSS

Процентиль: 96%
0.24915
Средний

5.8 Medium

CVSS2