7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
71.4%
Apache Tomcat reports:
If Tomcat was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.
The CVSS score for this vulnerability is 7.5 High
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | tomcat | = 8.5.0 | UNKNOWN |
FreeBSD | any | noarch | tomcat | < 8.5.83 | UNKNOWN |
FreeBSD | any | noarch | tomcat85 | = 8.5.0 | UNKNOWN |
FreeBSD | any | noarch | tomcat85 | < 8.5.83 | UNKNOWN |
FreeBSD | any | noarch | tomcat9 | = 9.0.0-M1 | UNKNOWN |
FreeBSD | any | noarch | tomcat9 | < 9.0.68 | UNKNOWN |
FreeBSD | any | noarch | tomcat10 | = 10.0.0-M1 | UNKNOWN |
FreeBSD | any | noarch | tomcat10 | < 10.0.27 | UNKNOWN |
FreeBSD | any | noarch | tomcat101 | = 10.1.0-M1 | UNKNOWN |
FreeBSD | any | noarch | tomcat101 | < 10.1.1 | UNKNOWN |
7.5 High
CVSS3
Attack Vector
NETWORK
Attack Complexity
LOW
Privileges Required
NONE
User Interaction
NONE
Scope
UNCHANGED
Confidentiality Impact
NONE
Integrity Impact
HIGH
Availability Impact
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N
5 Medium
CVSS2
Access Vector
NETWORK
Access Complexity
LOW
Authentication
NONE
Confidentiality Impact
NONE
Integrity Impact
PARTIAL
Availability Impact
NONE
AV:N/AC:L/Au:N/C:N/I:P/A:N
0.003 Low
EPSS
Percentile
71.4%