Lucene search

K
githubGitHub Advisory DatabaseGHSA-7W75-32CG-R6G2
HistoryMar 13, 2024 - 6:31 p.m.

Apache Tomcat Denial of Service due to improper input validation vulnerability for HTTP/2 requests

2024-03-1318:31:34
CWE-20
GitHub Advisory Database
github.com
23
apache tomcat
denial of service
http/2
input validation
security vulnerability

AI Score

7.2

Confidence

High

EPSS

0

Percentile

14.8%

Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98.

Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue.

Affected configurations

Vulners
Node
org.apache.tomcattomcat-coyoteRange8.5.08.5.98
OR
org.apache.tomcattomcat-coyoteRange9.0.0-M19.0.85
OR
org.apache.tomcattomcat-coyoteRange10.1.0-M110.1.18
OR
org.apache.tomcattomcat-coyoteRange11.0.0-M111.0.0-M16
OR
org.apache.tomcat.embedtomcat-embed-coreRange11.0.0-M111.0.0-M16
OR
org.apache.tomcat.embedtomcat-embed-coreRange10.1.0-M110.1.18
OR
org.apache.tomcat.embedtomcat-embed-coreRange9.0.0-M19.0.85
OR
org.apache.tomcat.embedtomcat-embed-coreRange8.5.08.5.98
VendorProductVersionCPE
org.apache.tomcattomcat-coyote*cpe:2.3:a:org.apache.tomcat:tomcat-coyote:*:*:*:*:*:*:*:*
org.apache.tomcat.embedtomcat-embed-core*cpe:2.3:a:org.apache.tomcat.embed:tomcat-embed-core:*:*:*:*:*:*:*:*