Búsqueda de    
Vulnerabilidad   
    Buscar 324607 Descripciones CVE y
145615 Descripciones de Pruebas,
accesos 10,000+ referencias cruzadas.
Pruebas   CVE   Todos  

ID de Prueba:1.3.6.1.4.1.25623.1.0.146267
Categoría:Web Servers
Título:Apache Tomcat HTTP Request Smuggling Vulnerability (Jul 2021) - Windows
Resumen:Apache Tomcat is prone to an HTTP request smuggling vulnerability.
Descripción:Summary:
Apache Tomcat is prone to an HTTP request smuggling vulnerability.

Vulnerability Insight:
Apache Tomcat does not correctly parse the HTTP transfer-encoding
request header in some circumstances leading to the possibility to request smuggling when used
with a reverse proxy. Specifically: Tomcat incorrectly ignores the transfer-encoding header if
the client declared it would only accept an HTTP/1.0 response. Tomcat honours the identify
encoding and Tomcat does not ensure that, if present, the chunked encoding is the final encoding.

Affected Software/OS:
Apache Tomcat 8.5.x through 8.5.66, 9.0.0.M1 through 9.0.46
and 10.0.0-M1 through 10.0.6.

Solution:
Update to version 8.5.68, 9.0.48, 10.0.7 or later.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Referencia Cruzada: Common Vulnerability Exposure (CVE) ID: CVE-2021-33037
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://security.netapp.com/advisory/ntap-20210827-0007/
Debian Security Information: DSA-4952 (Google Search)
https://www.debian.org/security/2021/dsa-4952
https://security.gentoo.org/glsa/202208-34
https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html
https://lists.apache.org/thread.html/re01e7e93154e8bdf78a11a23f9686427bd3d51fc6e12c508645567b7@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r40f921575aee8d7d34e53182f862c45cbb8f3d898c9d4e865c2ec262@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rd0dfea39829bc0606c936a16f6fca338127c86c0a1083970b45ac8d2@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r290aee55b72811fd19e75ac80f6143716c079170c5671b96932ed44b@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf1b54fd3f52f998ca4829159a88cc4c23d6cef5c6447d00948e75c97@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc6ef52453bb996a98cb45442871a1db56b7c349939e45d829bf9ae37@%3Ccommits.tomee.apache.org%3E
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

Esta es sólo una de 145615 pruebas de vulnerabilidad en nuestra serie de pruebas. Encuentre más sobre cómo ejecutar una auditoría de seguridad completa.

Para ejecutar una prueba gratuita de esta vulnerabilidad contra su sistema, regístrese ahora.




© 1998-2025 E-Soft Inc. Todos los derechos reservados.