Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2022-42252

Опубликовано: 31 окт. 2022
Источник: redhat
CVSS3: 4.8
EPSS Низкий

Описание

If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.

A flaw was found in Apache Tomcat. If the server is configured to ignore invalid HTTP headers, the server does not reject a request containing an invalid content-length header, making it vulnerable to a request smuggling attack.

Отчет

Red Hat Satellite does not include the affected Apache Tomcat, however, Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform. Tomcat requires a non-standard setting of rejectIllegalHeader = false. Also it demands Tomcat to be behind a proxy reverse proxy that also failed to reject the request with the invalid header. A malicious attacker would need time and efforts to go through the environment and jeopardize the environment by accessing protected data. Hence the CVSS score of 4.8.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tomcat6Not affected
Red Hat Enterprise Linux 7tomcatNot affected
Red Hat Enterprise Linux 8pki-deps:10.6/pki-servlet-engineNot affected
Red Hat Enterprise Linux 8tomcatNot affected
Red Hat Enterprise Linux 9pki-servlet-engineNot affected
Red Hat Enterprise Linux 9tomcatNot affected
Red Hat JBoss Web Server 3tomcatOut of support scope
Red Hat JBoss Web Server 3tomcat7Out of support scope
Red Hat JBoss Web Server 3tomcat8Out of support scope
Red Hat JBoss Web Server 5jws5-tomcatFixedRHSA-2023:166412.04.2023

Показывать по

Дополнительная информация

Статус:

Low
Дефект:
CWE-444

EPSS

Процентиль: 38%
0.00164
Низкий

4.8 Medium

CVSS3

Связанные уязвимости

CVSS3: 7.5
ubuntu
больше 2 лет назад

If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.

CVSS3: 7.5
nvd
больше 2 лет назад

If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.

CVSS3: 7.5
debian
больше 2 лет назад

If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10. ...

suse-cvrf
больше 2 лет назад

Security update for tomcat

suse-cvrf
больше 2 лет назад

Security update for tomcat

EPSS

Процентиль: 38%
0.00164
Низкий

4.8 Medium

CVSS3