CVE-2023-46589
Description
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single
request as multiple requests leading to the possibility of request
smuggling when behind a reverse proxy.
Older, EOL versions may also be affected.
Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.
CWE
- CWE-444 — CWE-444 Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Affected
- Apache Software Foundation / Apache Tomcat — v=11.0.0-M1 ≤11.0.0-M10 [affected]; v=10.1.0-M1 ≤10.1.15 [affected]; v=9.0.0-M1 ≤9.0.82 [affected]; v=8.5.0 ≤8.5.95 [affected]; v=3 <8.5.0 [unknown]; v=10.0.0-M1 ≤10.0.27 [unknown]
CVSS
- (none)
References
- https://lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr vendor-advisory
- https://www.openwall.com/lists/oss-security/2023/11/28/2
Source
cvelistV5-main/cves/2023/46xxx/CVE-2023-46589.json