← Back to CVEs
CVE-2021-33037
MEDIUM5.3
Description
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
CVE Details
CVSS v3.1 Score5.3
SeverityMEDIUM
CVSS VectorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N
Attack VectorNETWORK
ComplexityLOW
Privileges RequiredNONE
User InteractionNONE
Published7/12/2021
Last Modified11/21/2024
Sourcenvd
Honeypot Sightings0
Affected Products
apache:tomcatapache:tomeedebian:debian_linuxmcafee:epolicy_orchestratororacle:agile_plmoracle:communications_cloud_native_core_policyoracle:communications_cloud_native_core_service_communication_proxyoracle:communications_diameter_signaling_routeroracle:communications_instant_messaging_serveroracle:communications_policy_managementoracle:communications_pricing_design_centeroracle:communications_session_report_manageroracle:communications_session_route_manageroracle:graph_server_and_clientoracle:healthcare_translational_researchoracle:hospitality_cruise_shipboard_property_management_systemoracle:instantis_enterprisetrackoracle:managed_file_transferoracle:mysql_enterprise_monitororacle:sd-wan_edgeoracle:secure_global_desktoporacle:utilities_testing_accelerator
Weaknesses (CWE)
CWE-444CWE-444
References
https://kc.mcafee.com/corporate/index?page=content&id=SB10366(security@apache.org)
https://lists.apache.org/thread.html/r290aee55b72811fd19e75ac80f6143716c079170c5671b96932ed44b%40%3Ccommits.tomee.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/r40f921575aee8d7d34e53182f862c45cbb8f3d898c9d4e865c2ec262%40%3Ccommits.tomee.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/rc6ef52453bb996a98cb45442871a1db56b7c349939e45d829bf9ae37%40%3Ccommits.tomee.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/rd0dfea39829bc0606c936a16f6fca338127c86c0a1083970b45ac8d2%40%3Ccommits.tomee.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/re01e7e93154e8bdf78a11a23f9686427bd3d51fc6e12c508645567b7%40%3Ccommits.tomee.apache.org%3E(security@apache.org)
https://lists.apache.org/thread.html/rf1b54fd3f52f998ca4829159a88cc4c23d6cef5c6447d00948e75c97%40%3Ccommits.tomee.apache.org%3E(security@apache.org)
https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html(security@apache.org)
https://security.gentoo.org/glsa/202208-34(security@apache.org)
https://security.netapp.com/advisory/ntap-20210827-0007/(security@apache.org)
https://www.debian.org/security/2021/dsa-4952(security@apache.org)
https://www.oracle.com//security-alerts/cpujul2021.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuapr2022.html(security@apache.org)
https://www.oracle.com/security-alerts/cpujan2022.html(security@apache.org)
https://www.oracle.com/security-alerts/cpuoct2021.html(security@apache.org)
https://kc.mcafee.com/corporate/index?page=content&id=SB10366(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r290aee55b72811fd19e75ac80f6143716c079170c5671b96932ed44b%40%3Ccommits.tomee.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r40f921575aee8d7d34e53182f862c45cbb8f3d898c9d4e865c2ec262%40%3Ccommits.tomee.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/rc6ef52453bb996a98cb45442871a1db56b7c349939e45d829bf9ae37%40%3Ccommits.tomee.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/rd0dfea39829bc0606c936a16f6fca338127c86c0a1083970b45ac8d2%40%3Ccommits.tomee.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/re01e7e93154e8bdf78a11a23f9686427bd3d51fc6e12c508645567b7%40%3Ccommits.tomee.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.apache.org/thread.html/rf1b54fd3f52f998ca4829159a88cc4c23d6cef5c6447d00948e75c97%40%3Ccommits.tomee.apache.org%3E(af854a3a-2127-422b-91ae-364da2661108)
https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html(af854a3a-2127-422b-91ae-364da2661108)
https://security.gentoo.org/glsa/202208-34(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20210827-0007/(af854a3a-2127-422b-91ae-364da2661108)
https://www.debian.org/security/2021/dsa-4952(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com//security-alerts/cpujul2021.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuapr2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpujan2022.html(af854a3a-2127-422b-91ae-364da2661108)
https://www.oracle.com/security-alerts/cpuoct2021.html(af854a3a-2127-422b-91ae-364da2661108)
IOC Correlations
No correlations recorded
This product uses data from the NVD API but is not endorsed or certified by the NVD.