First published: Tue Oct 10 2023(Updated: )
Apache Tomcat is vulnerable to HTTP request smuggling, caused by improper parsing of HTTP trailer headers. By sending a specially crafted invalid trailer header, an attacker could exploit this vulnerability to poison the web cache, bypass web application firewall protection, and conduct XSS attacks.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | >=8.5.0<8.5.94 | |
Apache Tomcat | >=9.0.1<9.0.81 | |
Apache Tomcat | >=10.1.1<10.1.14 | |
Apache Tomcat | =9.0.0-milestone1 | |
Apache Tomcat | =9.0.0-milestone10 | |
Apache Tomcat | =9.0.0-milestone11 | |
Apache Tomcat | =9.0.0-milestone12 | |
Apache Tomcat | =9.0.0-milestone13 | |
Apache Tomcat | =9.0.0-milestone14 | |
Apache Tomcat | =9.0.0-milestone15 | |
Apache Tomcat | =9.0.0-milestone16 | |
Apache Tomcat | =9.0.0-milestone17 | |
Apache Tomcat | =9.0.0-milestone18 | |
Apache Tomcat | =9.0.0-milestone19 | |
Apache Tomcat | =9.0.0-milestone2 | |
Apache Tomcat | =9.0.0-milestone20 | |
Apache Tomcat | =9.0.0-milestone21 | |
Apache Tomcat | =9.0.0-milestone22 | |
Apache Tomcat | =9.0.0-milestone23 | |
Apache Tomcat | =9.0.0-milestone24 | |
Apache Tomcat | =9.0.0-milestone25 | |
Apache Tomcat | =9.0.0-milestone26 | |
Apache Tomcat | =9.0.0-milestone27 | |
Apache Tomcat | =9.0.0-milestone3 | |
Apache Tomcat | =9.0.0-milestone4 | |
Apache Tomcat | =9.0.0-milestone5 | |
Apache Tomcat | =9.0.0-milestone6 | |
Apache Tomcat | =9.0.0-milestone7 | |
Apache Tomcat | =9.0.0-milestone8 | |
Apache Tomcat | =9.0.0-milestone9 | |
Apache Tomcat | =10.1.0-milestone1 | |
Apache Tomcat | =10.1.0-milestone10 | |
Apache Tomcat | =10.1.0-milestone11 | |
Apache Tomcat | =10.1.0-milestone12 | |
Apache Tomcat | =10.1.0-milestone13 | |
Apache Tomcat | =10.1.0-milestone14 | |
Apache Tomcat | =10.1.0-milestone15 | |
Apache Tomcat | =10.1.0-milestone16 | |
Apache Tomcat | =10.1.0-milestone17 | |
Apache Tomcat | =10.1.0-milestone18 | |
Apache Tomcat | =10.1.0-milestone19 | |
Apache Tomcat | =10.1.0-milestone2 | |
Apache Tomcat | =10.1.0-milestone20 | |
Apache Tomcat | =10.1.0-milestone3 | |
Apache Tomcat | =10.1.0-milestone4 | |
Apache Tomcat | =10.1.0-milestone5 | |
Apache Tomcat | =10.1.0-milestone6 | |
Apache Tomcat | =10.1.0-milestone7 | |
Apache Tomcat | =10.1.0-milestone8 | |
Apache Tomcat | =10.1.0-milestone9 | |
Apache Tomcat | =11.0.0-milestone1 | |
Apache Tomcat | =11.0.0-milestone10 | |
Apache Tomcat | =11.0.0-milestone11 | |
Apache Tomcat | =11.0.0-milestone2 | |
Apache Tomcat | =11.0.0-milestone3 | |
Apache Tomcat | =11.0.0-milestone4 | |
Apache Tomcat | =11.0.0-milestone5 | |
Apache Tomcat | =11.0.0-milestone6 | |
Apache Tomcat | =11.0.0-milestone7 | |
Apache Tomcat | =11.0.0-milestone8 | |
Apache Tomcat | =11.0.0-milestone9 | |
Debian Debian Linux | =10.0 | |
Debian Debian Linux | =11.0 | |
Debian Debian Linux | =12.0 | |
debian/tomcat10 | 10.1.6-1+deb12u1 10.1.16-1 | |
debian/tomcat9 | <=9.0.31-1~deb10u6<=9.0.43-2~deb11u6 | 9.0.31-1~deb10u10 9.0.43-2~deb11u9 9.0.70-2 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=8.5.0<8.5.94 | 8.5.94 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=9.0.0-M1<9.0.81 | 9.0.81 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=10.1.0-M1<10.1.14 | 10.1.14 |
maven/org.apache.tomcat.embed:tomcat-embed-core | >=11.0.0-M1<11.0.0-M12 | 11.0.0-M12 |
maven/org.apache.tomcat:tomcat | >=8.5.0<8.5.94 | 8.5.94 |
maven/org.apache.tomcat:tomcat | >=9.0.0-M1<9.0.81 | 9.0.81 |
maven/org.apache.tomcat:tomcat | >=10.1.0-M1<10.1.14 | 10.1.14 |
maven/org.apache.tomcat:tomcat | >=11.0.0-M1<11.0.0-M12 | 11.0.0-M12 |
redhat/tomcat | <11.0.0 | 11.0.0 |
redhat/tomcat | <10.1.14 | 10.1.14 |
redhat/tomcat | <9.0.81 | 9.0.81 |
redhat/tomcat | <8.5.94 | 8.5.94 |
IBM IBM® Engineering Requirements Management DOORS | <=9.7.2.7 | |
IBM IBM® Engineering Requirements Management DOORS Web Access | <=9.7.2.7 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2023-45648 is a vulnerability in Apache Tomcat that allows for improper input validation.
Apache Tomcat versions 11.0.0-M1 through 11.0.0-M11, 10.1.0-M1 through 10.1.13, 9.0.0-M1 through 9.0.81, and 8.5.0 through 8.5.93 are affected by CVE-2023-45648.
A specially crafted, invalid trailer header can exploit CVE-2023-45648 by causing Tomcat to incorrectly parse HTTP trailer headers.
The severity of CVE-2023-45648 is not specified.
To fix CVE-2023-45648, update Apache Tomcat to versions 8.5.94, 9.0.81, 10.1.14, or 11.0.0-M12 depending on the affected version.