First published: Tue Nov 01 2022(Updated: )
Apache Tomcat is vulnerable to HTTP request smuggling, caused by the failure to reject a request containing an invalid Content-Length header when configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false. By sending a specially-crafted request, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
Credit: security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | >=8.5.0<8.5.83 | |
Apache Tomcat | >=9.0.0<9.0.68 | |
Apache Tomcat | >=10.0.0<10.0.27 | |
Apache Tomcat | >=10.1.0<10.1.1 | |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 | |
maven/org.apache.tomcat:tomcat-coyote | >=10.1.0-M1<10.1.1 | 10.1.1 |
maven/org.apache.tomcat:tomcat-coyote | >=10.0.0-M1<10.0.27 | 10.0.27 |
maven/org.apache.tomcat:tomcat-coyote | >=9.0.0-M1<9.0.68 | 9.0.68 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=10.1.0-M1<10.1.1 | 10.1.1 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=10.0.0-M1<10.0.27 | 10.0.27 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=9.0.0-M1<9.0.68 | 9.0.68 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=8.5.0<8.5.83 | 8.5.83 |
redhat/tomcat | <10.1.1 | 10.1.1 |
redhat/tomcat | <10.0.27 | 10.0.27 |
redhat/tomcat | <9.0.68 | 9.0.68 |
redhat/tomcat | <8.5.83 | 8.5.83 |
debian/tomcat9 | 9.0.43-2~deb11u10 9.0.70-2 | |
ubuntu/tomcat8 | <8.5.39-1ubuntu1~18.04.3+ | 8.5.39-1ubuntu1~18.04.3+ |
ubuntu/tomcat8 | <8.5.82 | 8.5.82 |
ubuntu/tomcat9 | <9.0.16-3ubuntu0.18.04.2+ | 9.0.16-3ubuntu0.18.04.2+ |
ubuntu/tomcat9 | <9.0.31-1ubuntu0.5 | 9.0.31-1ubuntu0.5 |
ubuntu/tomcat9 | <9.0.58-1ubuntu0.1+ | 9.0.58-1ubuntu0.1+ |
ubuntu/tomcat9 | <9.0.68 | 9.0.68 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this Apache Tomcat vulnerability is CVE-2022-42252.
The severity of CVE-2022-42252 is high with a CVSS score of 7.5.
Apache Tomcat versions 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26, and 10.1.0-M1 to 10.1.0 are affected by CVE-2022-42252.
To fix CVE-2022-42252, upgrade your Apache Tomcat installation to version 8.5.83, 9.0.68, 10.0.27, or 10.1.1 depending on the version you are using.
Yes, you can find more information about CVE-2022-42252 from the following references: - [NVD](https://nvd.nist.gov/vuln/detail/CVE-2022-42252) - [Apache Tomcat Mailing List](https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq) - [Gentoo Security Advisory](https://security.gentoo.org/glsa/202305-37)