Описание
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | DNE | |
esm-apps/xenial | not-affected | code not present |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE | |
jammy | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
devel | DNE | |
esm-apps/bionic | not-affected | code not present |
esm-apps/xenial | not-affected | code not present |
esm-infra-legacy/trusty | not-affected | code not present |
esm-infra/focal | DNE | |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
devel | DNE | |
esm-apps/bionic | released | 8.5.39-1ubuntu1~18.04.3+esm2 |
esm-infra-legacy/trusty | DNE | |
esm-infra/focal | DNE | |
esm-infra/xenial | not-affected | code not present |
focal | DNE | |
groovy | DNE | |
hirsute | DNE | |
impish | DNE |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | released | 9.0.16-3ubuntu0.18.04.2 |
devel | not-affected | 9.0.70-2 |
esm-apps/bionic | released | 9.0.16-3ubuntu0.18.04.2 |
esm-apps/focal | released | 9.0.31-1ubuntu0.2 |
esm-apps/jammy | not-affected | 9.0.43-3 |
esm-apps/noble | not-affected | 9.0.70-1ubuntu1 |
esm-infra-legacy/trusty | DNE | |
focal | released | 9.0.31-1ubuntu0.2 |
groovy | ignored | end of life |
hirsute | ignored | end of life |
Показывать по
Ссылки на источники
EPSS
5 Medium
CVSS2
7.5 High
CVSS3
Связанные уязвимости
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
When responding to new h2c connection requests, Apache Tomcat versions ...
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat
Уязвимость реализации сетевого протокола HTTP/2 сервера приложений Apache Tomcat, позволяющая нарушителю оказать воздействие на конфиденциальность, целостность и доступность защищаемой информации
EPSS
5 Medium
CVSS2
7.5 High
CVSS3