vulnerability
CentOS Linux: CVE-2020-1935: Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update (Multiple Advisories)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
6 | (AV:N/AC:M/Au:N/C:P/I:P/A:N) | 2020-02-24 | 2020-11-11 | 2023-05-25 |
Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
2020-02-24
Added
2020-11-11
Modified
2023-05-25
Description
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
Solution(s)
centos-upgrade-apache-commons-collectionscentos-upgrade-apache-commons-langcentos-upgrade-apache-commons-netcentos-upgrade-bea-stax-apicentos-upgrade-glassfish-fastinfosetcentos-upgrade-glassfish-jaxb-apicentos-upgrade-glassfish-jaxb-corecentos-upgrade-glassfish-jaxb-runtimecentos-upgrade-glassfish-jaxb-txw2centos-upgrade-jackson-annotationscentos-upgrade-jackson-corecentos-upgrade-jackson-databindcentos-upgrade-jackson-jaxrs-json-providercentos-upgrade-jackson-jaxrs-providerscentos-upgrade-jackson-module-jaxb-annotationscentos-upgrade-jakarta-commons-httpclientcentos-upgrade-javassistcentos-upgrade-javassist-javadoccentos-upgrade-jsscentos-upgrade-jss-debuginfocentos-upgrade-jss-debugsourcecentos-upgrade-jss-javadoccentos-upgrade-ldapjdkcentos-upgrade-ldapjdk-javadoccentos-upgrade-pki-basecentos-upgrade-pki-base-javacentos-upgrade-pki-cacentos-upgrade-pki-core-debuginfocentos-upgrade-pki-core-debugsourcecentos-upgrade-pki-kracentos-upgrade-pki-servercentos-upgrade-pki-servlet-4-0-apicentos-upgrade-pki-servlet-enginecentos-upgrade-pki-symkeycentos-upgrade-pki-symkey-debuginfocentos-upgrade-pki-toolscentos-upgrade-pki-tools-debuginfocentos-upgrade-python-nss-debugsourcecentos-upgrade-python-nss-doccentos-upgrade-python3-nsscentos-upgrade-python3-nss-debuginfocentos-upgrade-python3-pkicentos-upgrade-relaxngdatatypecentos-upgrade-resteasycentos-upgrade-slf4jcentos-upgrade-slf4j-jdk14centos-upgrade-stax-excentos-upgrade-tomcatcentos-upgrade-tomcat-admin-webappscentos-upgrade-tomcat-docs-webappcentos-upgrade-tomcat-el-2-2-apicentos-upgrade-tomcat-javadoccentos-upgrade-tomcat-jsp-2-2-apicentos-upgrade-tomcat-jsvccentos-upgrade-tomcat-libcentos-upgrade-tomcat-servlet-3-0-apicentos-upgrade-tomcat-webappscentos-upgrade-tomcatjsscentos-upgrade-velocitycentos-upgrade-xalan-j2centos-upgrade-xerces-j2centos-upgrade-xml-commons-apiscentos-upgrade-xml-commons-resolvercentos-upgrade-xmlstreambuffercentos-upgrade-xsom

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.