← Zuruck zu CVEs
CVE-2019-17569
MEDIUM4.8
Beschreibung
The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
CVE Details
CVSS v3.1 Bewertung4.8
SchweregradMEDIUM
CVSS VektorCVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
AngriffsvektorNETWORK
KomplexitatHIGH
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht2/24/2020
Zuletzt geandert11/21/2024
Quellenvd
Honeypot-Sichtungen0
Betroffene Produkte
apache:tomcatapache:tomeedebian:debian_linuxnetapp:data_availability_servicesnetapp:oncommand_system_manageropensuse:leaporacle:agile_engineering_data_managementoracle:agile_plmoracle:communications_instant_messaging_serveroracle:health_sciences_empirica_inspectionsoracle:health_sciences_empirica_signaloracle:hospitality_guest_accessoracle:instantis_enterprisetrackoracle:mysql_enterprise_monitororacle:transportation_managementoracle:workload_manager
Schwachen (CWE)
CWE-444
Referenzen
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html(security@apache.org)
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E(security@apache.org)
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html(security@apache.org)
https://security.netapp.com/advisory/ntap-20200327-0005/(security@apache.org)
https://www.debian.org/security/2020/dsa-4673(security@apache.org)
https://www.debian.org/security/2020/dsa-4680(security@apache.org)
https://www.oracle.com/security-alerts/cpujan2021.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujul2020.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuoct2020.html(security@apache.org)
http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20200327-0005/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4673(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2020/dsa-4680(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujul2020.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2020.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Korrelationen
Keine Korrelationen erfasst
This product uses data from the NVD API but is not endorsed or certified by the NVD.