Rapid7 Vulnerability & Exploit Database

Apache Tomcat Transfer-Encoding Information Disclosure and DoS

Back to Search

Apache Tomcat Transfer-Encoding Information Disclosure and DoS

Disclosed
07/09/2010
Created
05/30/2018

Description

Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."

Author(s)

  • Steve Jones
  • Hoagie <andi@void.at>
  • Paulino Calderon <calderon@websec.mx>

Development

References

Module Options

To display the available options, load the module within the Metasploit console and run the commands 'show options' or 'show advanced':

msf > use auxiliary/dos/http/apache_tomcat_transfer_encoding
msf auxiliary(apache_tomcat_transfer_encoding) > show actions
    ...actions...
msf auxiliary(apache_tomcat_transfer_encoding) > set ACTION < action-name >
msf auxiliary(apache_tomcat_transfer_encoding) > show options
    ...show and set options...
msf auxiliary(apache_tomcat_transfer_encoding) > run 

Time is precious, so I don’t want to do something manually that I can automate. Leveraging the Metasploit Framework when automating any task keeps us from having to re-create the wheel as we can use the existing libraries and focus our efforts where it matters.

– Jim O’Gorman | President, Offensive Security

;