CVE-2020-13943

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:8.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.34:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.38:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.39:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.40:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.41:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.42:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.43:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.44:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.45:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.46:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.47:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.48:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.49:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.50:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.51:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.52:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.53:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.54:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.55:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.56:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:8.5.57:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone21:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone22:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone23:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone24:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone25:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone26:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone27:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone5:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone6:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone7:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone8:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.0:milestone9:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.34:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:9.0.37:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.0.0:milestone1:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.0.0:milestone2:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.0.0:milestone3:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.0.0:milestone4:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.0.0:milestone5:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.0.0:milestone6:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:10.0.0:milestone7:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*

History

21 Nov 2024, 05:02

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html - Mailing List, Third Party Advisory () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00002.html - Mailing List, Third Party Advisory
References () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html - Broken Link () http://lists.opensuse.org/opensuse-security-announce/2020-11/msg00021.html - Broken Link
References () https://lists.apache.org/thread.html/r4a390027eb27e4550142fac6c8317cc684b157ae314d31514747f307%40%3Cannounce.tomcat.apache.org%3E - Vendor Advisory () https://lists.apache.org/thread.html/r4a390027eb27e4550142fac6c8317cc684b157ae314d31514747f307%40%3Cannounce.tomcat.apache.org%3E - Vendor Advisory
References () https://lists.debian.org/debian-lts-announce/2020/10/msg00019.html - Third Party Advisory () https://lists.debian.org/debian-lts-announce/2020/10/msg00019.html - Third Party Advisory
References () https://security.netapp.com/advisory/ntap-20201016-0007/ - Third Party Advisory () https://security.netapp.com/advisory/ntap-20201016-0007/ - Third Party Advisory
References () https://www.debian.org/security/2021/dsa-4835 - Third Party Advisory () https://www.debian.org/security/2021/dsa-4835 - Third Party Advisory
References () https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory () https://www.oracle.com/security-alerts/cpuApr2021.html - Patch, Third Party Advisory

Information

Published : 2020-10-12 14:15

Updated : 2024-11-21 05:02


NVD link : CVE-2020-13943

Mitre link : CVE-2020-13943

CVE.ORG link : CVE-2020-13943


JSON object : View

Products Affected

oracle

  • instantis_enterprisetrack
  • sd-wan_edge

debian

  • debian_linux

apache

  • tomcat