Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Information
Published : 2021-07-12 08:15
Updated : 2022-10-26 18:08
NVD link : CVE-2021-33037
Mitre link : CVE-2021-33037
JSON object : View
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')
Products Affected
oracle
- communications_session_route_manager
- communications_session_report_manager
- secure_global_desktop
- communications_policy_management
- communications_diameter_signaling_router
- communications_cloud_native_core_service_communication_proxy
- mysql_enterprise_monitor
- communications_instant_messaging_server
- utilities_testing_accelerator
- hospitality_cruise_shipboard_property_management_system
- graph_server_and_client
- agile_plm
- instantis_enterprisetrack
- sd-wan_edge
- healthcare_translational_research
- communications_pricing_design_center
- communications_cloud_native_core_policy
- managed_file_transfer
apache
- tomee
- tomcat
mcafee
- epolicy_orchestrator
debian
- debian_linux