### [CVE-2013-4286](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2013-4286) ![](https://img.shields.io/static/v1?label=Product&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue) ![](https://img.shields.io/static/v1?label=Vulnerability&message=n%2Fa&color=brighgreen) ### Description Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090. ### POC #### Reference - http://seclists.org/fulldisclosure/2014/Dec/23 - http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html - http://www.oracle.com/technetwork/topics/security/cpuapr2015-2365600.html - http://www.oracle.com/technetwork/topics/security/cpujan2015-1972971.html - http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html - http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html - http://www.vmware.com/security/advisories/VMSA-2014-0012.html #### Github No PoCs found on GitHub currently.