Lucene search

K

Apache Tomcat HTTP Request Smuggling Vulnerability (Feb 2020) - Linux

🗓️ 25 Feb 2020 00:00:00Reported by Copyright (C) 2020 Greenbone AGType 
openvas
 openvas
🔗 plugins.openvas.org👁 117 Views

Apache Tomcat HTTP Request Smuggling Vulnerability (Feb 2020) - Linux. Prone to a HTTP request smuggling vulnerability. Affected versions 7.0.98 to 7.0.99, 8.5.48 to 8.5.50 and 9.0.28 to 9.0.30. Update to version 7.0.100, 8.5.51, 9.0.31 or later

Show more
Related
Refs
Code
ReporterTitlePublishedViews
Family
Github Security Blog
Potential HTTP request smuggling in Apache Tomcat
28 Feb 202001:10
github
OSV
Potential HTTP request smuggling in Apache Tomcat
28 Feb 202001:10
osv
OSV
CVE-2019-17569
24 Feb 202022:15
osv
OSV
tomcat7 - security update
4 Mar 202000:00
osv
OSV
tomcat8 - security update
3 May 202000:00
osv
OSV
Red Hat Security Advisory: Red Hat JBoss Web Server 5.3 release
16 Sep 202403:29
osv
OSV
tomcat9 - security update
6 May 202000:00
osv
OSV
tomcat-9.0.36-8.4 on GA media
15 Jun 202400:00
osv
OSV
tomcat10-10.1.14-1.1 on GA media
15 Jun 202400:00
osv
OpenVAS
Apache Tomcat HTTP Request Smuggling Vulnerability (Feb 2020) - Windows
25 Feb 202000:00
openvas
Rows per page
# SPDX-FileCopyrightText: 2020 Greenbone AG
# Some text descriptions might be excerpted from (a) referenced
# source(s), and are Copyright (C) by the respective right holder(s).
#
# SPDX-License-Identifier: GPL-2.0-only

CPE = "cpe:/a:apache:tomcat";

if (description)
{
  script_oid("1.3.6.1.4.1.25623.1.0.108714");
  script_version("2024-02-08T05:05:59+0000");
  script_tag(name:"last_modification", value:"2024-02-08 05:05:59 +0000 (Thu, 08 Feb 2024)");
  script_tag(name:"creation_date", value:"2020-02-25 06:37:31 +0000 (Tue, 25 Feb 2020)");
  script_tag(name:"cvss_base", value:"5.8");
  script_tag(name:"cvss_base_vector", value:"AV:N/AC:M/Au:N/C:P/I:P/A:N");
  script_tag(name:"severity_vector", value:"CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N");
  script_tag(name:"severity_origin", value:"NVD");
  script_tag(name:"severity_date", value:"2021-01-20 15:15:00 +0000 (Wed, 20 Jan 2021)");

  script_cve_id("CVE-2019-17569");

  script_tag(name:"qod_type", value:"remote_banner_unreliable");

  script_tag(name:"solution_type", value:"VendorFix");

  script_name("Apache Tomcat HTTP Request Smuggling Vulnerability (Feb 2020) - Linux");

  script_category(ACT_GATHER_INFO);

  script_copyright("Copyright (C) 2020 Greenbone AG");
  script_family("Web Servers");
  script_dependencies("gb_apache_tomcat_consolidation.nasl", "os_detection.nasl");
  script_mandatory_keys("apache/tomcat/detected", "Host/runs_unixoide");

  script_tag(name:"summary", value:"Apache Tomcat is prone to a HTTP request smuggling vulnerability.");

  script_tag(name:"vuldetect", value:"Checks if a vulnerable version is present on the target host.");

  script_tag(name:"affected", value:"Apache Tomcat 7.0.98 to 7.0.99, 8.5.48 to 8.5.50 and 9.0.28 to 9.0.30.");

  script_tag(name:"solution", value:"Update to version 7.0.100, 8.5.51, 9.0.31 or later.");

  script_xref(name:"URL", value:"https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E");

  exit(0);
}

include("host_details.inc");
include("version_func.inc");

if (isnull(port = get_app_port(cpe: CPE)))
  exit(0);

if (!infos = get_app_version_and_location(cpe: CPE, port: port, exit_no_version: TRUE))
  exit(0);

version = infos["version"];
location = infos["location"];

if (version_in_range(version: version, test_version: "7.0.98", test_version2: "7.0.99")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "7.0.100", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range(version: version, test_version: "8.5.48", test_version2: "8.5.50")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "8.5.51", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

if (version_in_range(version: version, test_version: "9.0.28", test_version2: "9.0.30")) {
  report = report_fixed_ver(installed_version: version, fixed_version: "9.0.31", install_path: location);
  security_message(port: port, data: report);
  exit(0);
}

exit(99);

Transform Your Security Services

Elevate your offerings with Vulners' advanced Vulnerability Intelligence. Contact us for a demo and discover the difference comprehensive, actionable intelligence can make in your security strategy.

Book a live demo
25 Feb 2020 00:00Current
7.5High risk
Vulners AI Score7.5
CVSS25.8
CVSS34.8
EPSS0.004
117
.json
Report