跳转到帖子

Apache Tomcat: Important: Request smuggling (CVE-2023-46589)

recommended_posts

发布于
  • Members

Apache Tomcat: Important: Request smuggling (CVE-2023-46589)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:N/I:C/A:N)
Published
11/29/2023
Created
11/30/2023
Added
11/29/2023
Modified
01/28/2025

Description

Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.

Solution(s)

  • apache-tomcat-upgrade-10_1_16
  • apache-tomcat-upgrade-8_5_96
  • apache-tomcat-upgrade-9_0_83

References

  • https://attackerkb.com/topics/cve-2023-46589
  • CVE - 2023-46589
  • http://tomcat.apache.org/security-10.html
  • http://tomcat.apache.org/security-8.html
  • http://tomcat.apache.org/security-9.html
  • 查看数 706
  • 已创建
  • 最后回复

参与讨论

你可立刻发布并稍后注册。 如果你有帐户,立刻登录发布帖子。
注意:你的帖子需要版主批准后才能看到。

游客
回帖…