Vulnerability   
Search   
    Search 324607 CVE descriptions
and 145615 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.146267
Category:Web Servers
Title:Apache Tomcat HTTP Request Smuggling Vulnerability (Jul 2021) - Windows
Summary:Apache Tomcat is prone to an HTTP request smuggling vulnerability.
Description:Summary:
Apache Tomcat is prone to an HTTP request smuggling vulnerability.

Vulnerability Insight:
Apache Tomcat does not correctly parse the HTTP transfer-encoding
request header in some circumstances leading to the possibility to request smuggling when used
with a reverse proxy. Specifically: Tomcat incorrectly ignores the transfer-encoding header if
the client declared it would only accept an HTTP/1.0 response. Tomcat honours the identify
encoding and Tomcat does not ensure that, if present, the chunked encoding is the final encoding.

Affected Software/OS:
Apache Tomcat 8.5.x through 8.5.66, 9.0.0.M1 through 9.0.46
and 10.0.0-M1 through 10.0.6.

Solution:
Update to version 8.5.68, 9.0.48, 10.0.7 or later.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:N/I:P/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2021-33037
https://kc.mcafee.com/corporate/index?page=content&id=SB10366
https://security.netapp.com/advisory/ntap-20210827-0007/
Debian Security Information: DSA-4952 (Google Search)
https://www.debian.org/security/2021/dsa-4952
https://security.gentoo.org/glsa/202208-34
https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3E
https://www.oracle.com//security-alerts/cpujul2021.html
https://www.oracle.com/security-alerts/cpuapr2022.html
https://www.oracle.com/security-alerts/cpujan2022.html
https://www.oracle.com/security-alerts/cpuoct2021.html
https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html
https://lists.apache.org/thread.html/re01e7e93154e8bdf78a11a23f9686427bd3d51fc6e12c508645567b7@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r40f921575aee8d7d34e53182f862c45cbb8f3d898c9d4e865c2ec262@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rd0dfea39829bc0606c936a16f6fca338127c86c0a1083970b45ac8d2@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/r290aee55b72811fd19e75ac80f6143716c079170c5671b96932ed44b@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rf1b54fd3f52f998ca4829159a88cc4c23d6cef5c6447d00948e75c97@%3Ccommits.tomee.apache.org%3E
https://lists.apache.org/thread.html/rc6ef52453bb996a98cb45442871a1db56b7c349939e45d829bf9ae37@%3Ccommits.tomee.apache.org%3E
CopyrightCopyright (C) 2021 Greenbone Networks GmbH

This is only one of 145615 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2025 E-Soft Inc. All rights reserved.