cve/2023/CVE-2023-46589.md

21 lines
1.3 KiB
Markdown
Raw Normal View History

2024-05-25 21:48:12 +02:00
### [CVE-2023-46589](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2023-46589)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Tomcat&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=11.0.0-M1%3C%3D%2011.0.0-M10%20&color=brighgreen)
![](https://img.shields.io/static/v1?label=Vulnerability&message=CWE-444%20Inconsistent%20Interpretation%20of%20HTTP%20Requests%20('HTTP%20Request%20Smuggling')&color=brighgreen)
### Description
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy.Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.
### POC
#### Reference
No PoCs from references.
#### Github
2024-05-28 08:49:17 +00:00
- https://github.com/Dzmitry-Basiachenka/dist-foreign-aliakh
2024-05-25 21:48:12 +02:00
- https://github.com/fkie-cad/nvd-json-data-feeds
- https://github.com/muneebaashiq/MBProjects
2024-05-28 08:49:17 +00:00
- https://github.com/seal-community/patches
2024-05-25 21:48:12 +02:00