Lucene search

K
githubGitHub Advisory DatabaseGHSA-42J3-498Q-M6VP
HistoryMay 14, 2022 - 1:10 a.m.

Improper Input Validation in Apache Tomcat

2022-05-1401:10:18
CWE-20
GitHub Advisory Database
github.com
21
improper input validation
apache tomcat
http request smuggling
denial of service
chunked transfer coding
vulnerability
security

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

AI Score

6.5

Confidence

Low

EPSS

0.948

Percentile

99.3%

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

Affected configurations

Vulners
Node
org.apache.tomcattomcatRange8.0.08.0.9
OR
org.apache.tomcattomcatRange7.0.07.0.55
OR
org.apache.tomcattomcatRange6.0.06.0.42
VendorProductVersionCPE
org.apache.tomcattomcat*cpe:2.3:a:org.apache.tomcat:tomcat:*:*:*:*:*:*:*:*

References

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:N/I:P/A:P

AI Score

6.5

Confidence

Low

EPSS

0.948

Percentile

99.3%