Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
07 Nov 2023, 03:35
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2021-07-12 15:15
Updated : 2024-02-28 18:28
NVD link : CVE-2021-33037
Mitre link : CVE-2021-33037
CVE.ORG link : CVE-2021-33037
JSON object : View
Products Affected
mcafee
- epolicy_orchestrator
oracle
- communications_instant_messaging_server
- communications_pricing_design_center
- communications_policy_management
- communications_cloud_native_core_policy
- communications_session_route_manager
- healthcare_translational_research
- sd-wan_edge
- secure_global_desktop
- agile_plm
- hospitality_cruise_shipboard_property_management_system
- communications_cloud_native_core_service_communication_proxy
- communications_session_report_manager
- utilities_testing_accelerator
- instantis_enterprisetrack
- mysql_enterprise_monitor
- communications_diameter_signaling_router
- managed_file_transfer
- graph_server_and_client
apache
- tomcat
- tomee
debian
- debian_linux
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')