Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-0227

Опубликовано: 09 фев. 2015
Источник: redhat
CVSS2: 4.3
EPSS Высокий

Описание

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

It was discovered that the ChunkedInputFilter in Tomcat did not fail subsequent attempts to read input after malformed chunked encoding was detected. A remote attacker could possibly use this flaw to make Tomcat process part of the request body as new request, or cause a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat BPM Suite 6jbosswebAffected
Red Hat Developer Toolset 2.0devtoolset-2-tomcatNot affected
Red Hat Enterprise Linux 5tomcat5Will not fix
Red Hat JBoss BRMS 6jbosswebAffected
Red Hat JBoss Data Grid 6jbosswebAffected
Red Hat JBoss Data Virtualization 6jbosswebAffected
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Web Server 1othersWill not fix
Red Hat JBoss Enterprise Web Server 1tomcat5Will not fix
Red Hat JBoss Enterprise Web Server 1tomcat6Will not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-400
https://bugzilla.redhat.com/show_bug.cgi?id=1109196Tomcat/JBossWeb: request smuggling and limited DoS in ChunkedInputFilter

EPSS

Процентиль: 99%
0.83786
Высокий

4.3 Medium

CVSS2

Связанные уязвимости

ubuntu
больше 10 лет назад

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

nvd
больше 10 лет назад

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

debian
больше 10 лет назад

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apach ...

github
около 3 лет назад

Improper Input Validation in Apache Tomcat

oracle-oval
около 10 лет назад

ELSA-2015-0991: tomcat6 security and bug fix update (MODERATE)

EPSS

Процентиль: 99%
0.83786
Высокий

4.3 Medium

CVSS2