Lucene search

K
nvd[email protected]NVD:CVE-2023-46589
HistoryNov 28, 2023 - 4:15 p.m.

CVE-2023-46589

2023-11-2816:15:06
CWE-444
web.nvd.nist.gov
apache tomcat
input validation
request smuggling
security vulnerability
upgrade

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.005 Low

EPSS

Percentile

76.1%

Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single
request as multiple requests leading to the possibility of request
smuggling when behind a reverse proxy.

Users are recommended to upgrade to version 11.0.0-M11Β onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.

Affected configurations

NVD
Node
apachetomcatRange8.5.0–8.5.96
OR
apachetomcatRange9.0.0–9.0.83
OR
apachetomcatRange10.1.0–10.1.16
OR
apachetomcatMatch11.0.0milestone1
OR
apachetomcatMatch11.0.0milestone10
OR
apachetomcatMatch11.0.0milestone2
OR
apachetomcatMatch11.0.0milestone3
OR
apachetomcatMatch11.0.0milestone4
OR
apachetomcatMatch11.0.0milestone5
OR
apachetomcatMatch11.0.0milestone6
OR
apachetomcatMatch11.0.0milestone7
OR
apachetomcatMatch11.0.0milestone8
OR
apachetomcatMatch11.0.0milestone9

7.5 High

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

0.005 Low

EPSS

Percentile

76.1%