
We found results for “”
CVE-2020-1935
Good to know:


Date: February 24, 2020
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
Language: Java
Severity Score
Related Resources (32)
Severity Score
Weakness Type (CWE)
Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')
CWE-444Top Fix

Upgrade Version
Upgrade to version io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.5.X;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.5.X;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;org.apache.tomcat:tomcat-coyote:7.0.100;org.apache.tomcat:tomcat-coyote:9.0.31;org.apache.tomcat:tomcat-coyote:8.5.51;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.tomcat.embed:tomcat-embed-core:8.5.51;org.apache.tomcat.embed:tomcat-embed-core:7.0.100;org.apache.tomcat.embed:tomcat-embed-core:9.0.31;org.apache.tomcat.embed:tomcat-embed-core:8.5.51;org.apache.tomcat.embed:tomcat-embed-core:7.0.100;org.optaweb.employeerostering:employee-rostering-backend:no_fix;org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-backend:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-standalone:no_fix;org.apache.camel:camel-example-spring-boot:2.17.1;org.apache.camel:camel-example-spring-boot:2.17.1;org.apache.camel:camel-example-spring-boot:2.17.1
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | HIGH |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | LOW |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | MEDIUM |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | PARTIAL |
Availability (A): | NONE |
Additional information: |