In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
07 Nov 2023, 03:19
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2020-02-24 22:15
Updated : 2024-02-28 17:28
NVD link : CVE-2020-1935
Mitre link : CVE-2020-1935
CVE.ORG link : CVE-2020-1935
JSON object : View
Products Affected
oracle
- communications_element_manager
- agile_product_lifecycle_management
- communications_instant_messaging_server
- hospitality_guest_access
- health_sciences_empirica_signal
- agile_engineering_data_management
- health_sciences_empirica_inspections
- workload_manager
- retail_order_broker
- siebel_ui_framework
- instantis_enterprisetrack
- hyperion_infrastructure_technology
- transportation_management
- mysql_enterprise_monitor
netapp
- data_availability_services
- oncommand_system_manager
canonical
- ubuntu_linux
opensuse
- leap
debian
- debian_linux
apache
- tomcat
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')