Lucene search

K
nvd[email protected]NVD:CVE-2023-45648
HistoryOct 10, 2023 - 7:15 p.m.

CVE-2023-45648

2023-10-1019:15:09
CWE-20
web.nvd.nist.gov
1
apache tomcat
input validation
vulnerability
upgrade
http trailer headers
request smuggling

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

6.3 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.6%

Improper Input Validation vulnerability in Apache Tomcat.Tomcatย from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially
crafted, invalid trailer header could cause Tomcat to treat a single
request as multiple requests leading to the possibility of request
smuggling when behind a reverse proxy.

Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.

Affected configurations

NVD
Node
apachetomcatRange8.5.0โ€“8.5.94
OR
apachetomcatRange9.0.1โ€“9.0.81
OR
apachetomcatRange10.1.1โ€“10.1.14
OR
apachetomcatMatch9.0.0milestone1
OR
apachetomcatMatch9.0.0milestone10
OR
apachetomcatMatch9.0.0milestone11
OR
apachetomcatMatch9.0.0milestone12
OR
apachetomcatMatch9.0.0milestone13
OR
apachetomcatMatch9.0.0milestone14
OR
apachetomcatMatch9.0.0milestone15
OR
apachetomcatMatch9.0.0milestone16
OR
apachetomcatMatch9.0.0milestone17
OR
apachetomcatMatch9.0.0milestone18
OR
apachetomcatMatch9.0.0milestone19
OR
apachetomcatMatch9.0.0milestone2
OR
apachetomcatMatch9.0.0milestone20
OR
apachetomcatMatch9.0.0milestone21
OR
apachetomcatMatch9.0.0milestone22
OR
apachetomcatMatch9.0.0milestone23
OR
apachetomcatMatch9.0.0milestone24
OR
apachetomcatMatch9.0.0milestone25
OR
apachetomcatMatch9.0.0milestone26
OR
apachetomcatMatch9.0.0milestone27
OR
apachetomcatMatch9.0.0milestone3
OR
apachetomcatMatch9.0.0milestone4
OR
apachetomcatMatch9.0.0milestone5
OR
apachetomcatMatch9.0.0milestone6
OR
apachetomcatMatch9.0.0milestone7
OR
apachetomcatMatch9.0.0milestone8
OR
apachetomcatMatch9.0.0milestone9
OR
apachetomcatMatch10.1.0milestone1
OR
apachetomcatMatch10.1.0milestone10
OR
apachetomcatMatch10.1.0milestone11
OR
apachetomcatMatch10.1.0milestone12
OR
apachetomcatMatch10.1.0milestone13
OR
apachetomcatMatch10.1.0milestone14
OR
apachetomcatMatch10.1.0milestone15
OR
apachetomcatMatch10.1.0milestone16
OR
apachetomcatMatch10.1.0milestone17
OR
apachetomcatMatch10.1.0milestone18
OR
apachetomcatMatch10.1.0milestone19
OR
apachetomcatMatch10.1.0milestone2
OR
apachetomcatMatch10.1.0milestone20
OR
apachetomcatMatch10.1.0milestone3
OR
apachetomcatMatch10.1.0milestone4
OR
apachetomcatMatch10.1.0milestone5
OR
apachetomcatMatch10.1.0milestone6
OR
apachetomcatMatch10.1.0milestone7
OR
apachetomcatMatch10.1.0milestone8
OR
apachetomcatMatch10.1.0milestone9
OR
apachetomcatMatch11.0.0milestone1
OR
apachetomcatMatch11.0.0milestone10
OR
apachetomcatMatch11.0.0milestone11
OR
apachetomcatMatch11.0.0milestone2
OR
apachetomcatMatch11.0.0milestone3
OR
apachetomcatMatch11.0.0milestone4
OR
apachetomcatMatch11.0.0milestone5
OR
apachetomcatMatch11.0.0milestone6
OR
apachetomcatMatch11.0.0milestone7
OR
apachetomcatMatch11.0.0milestone8
OR
apachetomcatMatch11.0.0milestone9
Node
debiandebian_linuxMatch10.0
OR
debiandebian_linuxMatch11.0
OR
debiandebian_linuxMatch12.0

5.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

LOW

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

6.3 Medium

AI Score

Confidence

High

0.002 Low

EPSS

Percentile

60.6%