Lucene search

K
cloudfoundryCloud FoundryCFOUNDRY:390173E5A22BDA87FAB841184E06944D
HistoryFeb 09, 2015 - 12:00 a.m.

CVE-2014-0227 Apache Tomcat Request Smuggling | Cloud Foundry

2015-02-0900:00:00
Cloud Foundry
www.cloudfoundry.org
29

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.948 High

EPSS

Percentile

99.2%

CVE-2014-0227 Apache Tomcat Request Smuggling

Important

Vendor

Apache Software Foundation

Versions Affected

  • Apache Tomcat 8.0.0-RC1 to 8.0.8 inclusive
  • Apache Tomcat 7.0.0 to 7.0.54 inclusive
  • Apache Tomcat 6.0.0 to 6.0.41 inclusive

Description

It was possible to craft a malformed chunk as part of a chunked request that caused Tomcat to read part of the request body as a new request.

Mitigation

Users of affected versions should apply the following mitigation:

  • Upgrade to tc Runtime 7.0.55.A or later
  • Upgrade to tc Runtime 6.0.43.A or later

Credit

This issue was identified by the Apache Tomcat security team.

References

History

2015-Feb-09: Initial vulnerability report published.

6.4 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

0.948 High

EPSS

Percentile

99.2%