Описание
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak.
A flaw was found in Tomcat. If a response did not have any HTTP headers set, no AJP SEND_HEADERS message would be sent, resulting in at least one AJP based proxy (mod_proxy_ajp) using the response headers from the previous request for the current request, leading to an information leak. The information leaked may give a user sensitive information which is uncontrolled.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | tomcat6 | Out of support scope | ||
Red Hat Enterprise Linux 7 | tomcat | Out of support scope | ||
Red Hat Enterprise Linux 8 | pki-deps:10.6/pki-servlet-engine | Not affected | ||
Red Hat Enterprise Linux 8 | tomcat | Not affected | ||
Red Hat Enterprise Linux 9 | pki-servlet-engine | Not affected | ||
Red Hat Enterprise Linux 9 | tomcat | Not affected | ||
Red Hat JBoss Web Server 5 | tomcat | Not affected | ||
Red Hat JBoss Web Server 6 | tomcat | Not affected |
Показывать по
Дополнительная информация
Статус:
EPSS
7.5 High
CVSS3
Связанные уязвимости
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak.
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak.
A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1 ...
Уязвимость сервера приложений Apache Tomcat, связанная с отсутствием защиты служебных данных. позволяющая нарушителю получить доступ к конфиденциальной информации
EPSS
7.5 High
CVSS3