Apache Tomcat 10.0.0-M1 < 10.0.7 Request Smuggling

medium Web App Scanning Plugin ID 112896

Synopsis

Apache Tomcat 10.0.0-M1 < 10.0.7 Request Smuggling

Description

The version of Apache Tomcat installed on the remote host is 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.47 or 8.5.0 to 8.5.67. It is, therefore, affected by a request smuggling because Apache Tomcat did not correctly parse the HTTP transfer-encoding request header in some circumstances when used with a reverse proxy.

Note that the scanner has not attempted to exploit these issues but has instead relied only on the application's self-reported version number.

Solution

Upgrade to Apache Tomcat version 10.0.7 or later.

See Also

https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0.7

Plugin Details

Severity: Medium

ID: 112896

Type: remote

Published: 7/19/2021

Updated: 3/14/2023

Scan Template: api, basic, full, pci, scan

Risk Information

VPR

Risk Factor: Low

Score: 1.4

CVSS v2

Risk Factor: Medium

Base Score: 5

Vector: CVSS2#AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS Score Source: CVE-2021-33037

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

CVSS Score Source: CVE-2021-33037

Vulnerability Information

CPE: cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

Exploit Ease: No known exploits are available

Patch Publication Date: 6/15/2021

Vulnerability Publication Date: 6/15/2021

Reference Information

CVE: CVE-2021-33037