In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
Configuration 6 (hide)
|
History
No history.
Information
Published : 2020-02-24 22:15
Updated : 2024-02-04 20:39
NVD link : CVE-2020-1935
Mitre link : CVE-2020-1935
CVE.ORG link : CVE-2020-1935
JSON object : View
Products Affected
oracle
- mysql_enterprise_monitor
- communications_instant_messaging_server
- health_sciences_empirica_signal
- siebel_ui_framework
- retail_order_broker
- transportation_management
- hospitality_guest_access
- hyperion_infrastructure_technology
- health_sciences_empirica_inspections
- agile_product_lifecycle_management
- instantis_enterprisetrack
- workload_manager
- communications_element_manager
- agile_engineering_data_management
apache
- tomcat
debian
- debian_linux
canonical
- ubuntu_linux
netapp
- oncommand_system_manager
- data_availability_services
opensuse
- leap
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request Smuggling')