
We found results for “”
CVE-2023-46589
Good to know:


Date: November 28, 2023
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 did not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Users are recommended to upgrade to version 11.0.0-M11Â onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.
Language: Java
Severity Score
Related Resources (17)
Severity Score
Weakness Type (CWE)
Top Fix

Upgrade Version
Upgrade to version org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.optaweb.vehiclerouting:optaweb-vehicle-routing-backend:no_fix;org.apache.tomcat.embed:tomcat-embed-core:11.0.0-M11;org.apache.tomcat.embed:tomcat-embed-core:8.5.96;org.apache.tomcat.embed:tomcat-embed-core:10.1.16;org.apache.tomcat.embed:tomcat-embed-core:9.0.83;org.apache.tomcat.embed:tomcat-embed-core:10.1.16;org.optaweb.employeerostering:optaweb-employee-rostering-standalone:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-standalone:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-standalone:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-standalone:no_fix;org.apache.tomcat:tomcat-coyote:8.5.96;org.apache.tomcat:tomcat-coyote:10.1.16;org.apache.tomcat:tomcat-coyote:11.0.0-M11;org.apache.tomcat:tomcat-coyote:9.0.83;io.fabric8.quickstarts.cxf.jaxrs:spring-boot-cxf-jaxrs-xml:no_fix;org.apache.tomcat:tomcat-catalina:9.0.83;org.apache.tomcat:tomcat-catalina:8.5.96;org.apache.tomcat:tomcat-catalina:11.0.0-M11;org.apache.tomcat:tomcat-catalina:10.1.16;org.kie:kie-server-spring-boot-integ-tests-sample:7.68.0.Final;org.jboss.redhat-fuse.apicurio:fuse-apicurito-generator:no_fix;org.jboss.redhat-fuse.apicurio:fuse-apicurito-generator:no_fix;org.kie:keycloak-kie-server-spring-boot-sample:7.68.0.Final;org.kie:keycloak-kie-server-spring-boot-sample:7.60.0.Final;org.kie:jbpm-spring-boot-sample-basic:7.68.0.Final;org.kie:jbpm-spring-boot-sample-basic:7.60.0.Final;org.kie:kie-server-spring-boot-kafka-sample:7.60.0.Final;org.kie:kie-server-spring-boot-kafka-sample:7.68.0.Final;org.optaweb.employeerostering:optaweb-employee-rostering-backend:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-backend:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-backend:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-backend:no_fix;org.optaweb.employeerostering:optaweb-employee-rostering-backend:no_fix;org.kie.kogito.examples:dmn-drools-springboot-metrics:1.6.0.Final;org.optaweb.employeerostering:employee-rostering-backend:no_fix;io.fabric8.quickstarts:spring-boot-camel-soap-rest-bridge:no_fix;org.kie.kogito.examples:ruleunit-springboot-example:1.6.0.Final;io.fabric8.quickstarts.cxf.jaxrs:spring-boot-cxf-jaxrs:no_fix;io.fabric8.quickstarts.cxf.jaxrs:spring-boot-cxf-jaxrs:no_fix;org.kie.kogito:dmn-listener-springboot:1.6.0.Final;org.kie.kogito:dmn-pmml-springboot-example:1.6.0.Final;org.kie.kogito:dmn-springboot-example:1.6.0.Final;org.acme:optaplanner-spring-boot-school-timetabling-quickstart:no_fix;org.kie.kogito:pmml-springboot-example:1.6.0.Final;org.kie:kie-server-spring-boot-sample:7.68.0.Final
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | NONE |
Integrity (I): | HIGH |
Availability (A): | NONE |