In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
Information
Published : 2020-02-24 14:15
Updated : 2021-05-04 12:19
NVD link : CVE-2020-1935
Mitre link : CVE-2020-1935
JSON object : View
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Products Affected
oracle
- health_sciences_empirica_inspections
- siebel_ui_framework
- mysql_enterprise_monitor
- instantis_enterprisetrack
- retail_order_broker
- communications_instant_messaging_server
- communications_element_manager
- agile_engineering_data_management
- agile_product_lifecycle_management
- health_sciences_empirica_signal
- transportation_management
- workload_manager
- hospitality_guest_access
- hyperion_infrastructure_technology
netapp
- oncommand_system_manager
- data_availability_services
apache
- tomcat
canonical
- ubuntu_linux
opensuse
- leap
debian
- debian_linux