Apache Tomcat: HTTP request smuggling via malformed trailer headers
CVE-2023-46589

7.5HIGH

Key Information:

Vendor
Apache
Vendor
CVE Published:
28 November 2023

Summary

An improper input validation vulnerability has been identified in Apache Tomcat, affecting several versions. This flaw arises from incorrect parsing of HTTP trailer headers, which can allow a single request to be misinterpreted as multiple requests. As a result, this can lead to potential request smuggling issues when the server is situated behind a reverse proxy. It is crucial for users to update to the fixed versions—11.0.0-M11 and onwards, 10.1.16 and onwards, 9.0.83 and onwards, or 8.5.96 and onwards—to mitigate this risk.

Affected Version(s)

Apache Tomcat 11.0.0-M1 <= 11.0.0-M10

Apache Tomcat 10.1.0-M1 <= 10.1.15

Apache Tomcat 9.0.0-M1 <= 9.0.82

References

CVSS V3.1

Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged

Timeline

  • Vulnerability published

  • Vulnerability Reserved

Credit

Norihito Aimoto (OSSTech Corporation)
.