Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
No history.
Information
Published : 2021-07-12 15:15
Updated : 2023-11-07 03:35
NVD link : CVE-2021-33037
Mitre link : CVE-2021-33037
CVE.ORG link : CVE-2021-33037
JSON object : View
Products Affected
mcafee
- epolicy_orchestrator
oracle
- agile_plm
- communications_cloud_native_core_policy
- instantis_enterprisetrack
- communications_cloud_native_core_service_communication_proxy
- hospitality_cruise_shipboard_property_management_system
- utilities_testing_accelerator
- sd-wan_edge
- secure_global_desktop
- managed_file_transfer
- graph_server_and_client
- mysql_enterprise_monitor
- communications_session_route_manager
- communications_pricing_design_center
- communications_diameter_signaling_router
- communications_instant_messaging_server
- healthcare_translational_research
- communications_session_report_manager
- communications_policy_management
apache
- tomee
- tomcat
debian
- debian_linux
CWE
CWE-444
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')