When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
History
21 Nov 2024, 05:54
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.openwall.com/lists/oss-security/2021/03/01/1 - Mailing List, Third Party Advisory | |
References | () https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E - Mailing List, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cusers.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b%40%3Cusers.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947%40%3Cusers.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202208-34 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20210409-0002/ - Third Party Advisory | |
References | () https://www.debian.org/security/2021/dsa-4891 - Third Party Advisory | |
References | () https://www.oracle.com//security-alerts/cpujul2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory |
07 Nov 2023, 03:31
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-03-01 12:15
Updated : 2024-11-21 05:54
NVD link : CVE-2021-25122
Mitre link : CVE-2021-25122
CVE.ORG link : CVE-2021-25122
JSON object : View
Products Affected
oracle
- communications_cloud_native_core_security_edge_protection_proxy
- communications_instant_messaging_server
- mysql_enterprise_monitor
- managed_file_transfer
- siebel_ui_framework
- communications_cloud_native_core_policy
- agile_plm
- graph_server_and_client
- instantis_enterprisetrack
- database
apache
- tomcat
debian
- debian_linux
CWE
CWE-200
Exposure of Sensitive Information to an Unauthorized Actor