Apache Tomcat: HTTP request smuggling via malformed trailer headers
CVE-2023-46589
7.5HIGH
Summary
An improper input validation vulnerability has been identified in Apache Tomcat, affecting several versions. This flaw arises from incorrect parsing of HTTP trailer headers, which can allow a single request to be misinterpreted as multiple requests. As a result, this can lead to potential request smuggling issues when the server is situated behind a reverse proxy. It is crucial for users to update to the fixed versions—11.0.0-M11 and onwards, 10.1.16 and onwards, 9.0.83 and onwards, or 8.5.96 and onwards—to mitigate this risk.
Affected Version(s)
Apache Tomcat 11.0.0-M1 <= 11.0.0-M10
Apache Tomcat 10.1.0-M1 <= 10.1.15
Apache Tomcat 9.0.0-M1 <= 9.0.82
References
CVSS V3.1
Score:
7.5
Severity:
HIGH
Confidentiality:
None
Integrity:
High
Availability:
None
Attack Vector:
Network
Attack Complexity:
Low
Privileges Required:
None
User Interaction:
None
Scope:
Unchanged
Timeline
Vulnerability published
Vulnerability Reserved
Credit
Norihito Aimoto (OSSTech Corporation)