Improper Input Validation in Apache Tomcat
High severity
GitHub Reviewed
Published
May 13, 2022
to the GitHub Advisory Database
•
Updated Feb 22, 2024
Package
Affected versions
>= 9.0.0.M1, <= 9.0.0.M11
>= 8.5.0, < 8.5.8
>= 8.0.0RC1, < 8.0.39
>= 7.0.0, < 7.0.73
>= 6.0.0, < 6.0.48
Patched versions
9.0.0.M12
8.5.8
8.0.39
7.0.73
6.0.48
Description
Published by the National Vulnerability Database
Mar 20, 2017
Published to the GitHub Advisory Database
May 13, 2022
Reviewed
Jul 6, 2022
Last updated
Feb 22, 2024
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
References