Rapid7 Vulnerability & Exploit Database

Centos Linux: CVE-2020-1935: Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update (Multiple Advisories)

Back to Search

Centos Linux: CVE-2020-1935: Moderate: pki-core:10.6 and pki-deps:10.6 security, bug fix, and enhancement update (Multiple Advisories)

Severity
6
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:N)
Published
02/24/2020
Created
11/13/2020
Added
11/11/2020
Modified
04/15/2021

Description

In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.

Solution(s)

  • centos-upgrade-apache-commons-collections
  • centos-upgrade-apache-commons-lang
  • centos-upgrade-apache-commons-net
  • centos-upgrade-bea-stax-api
  • centos-upgrade-glassfish-fastinfoset
  • centos-upgrade-glassfish-jaxb-api
  • centos-upgrade-glassfish-jaxb-core
  • centos-upgrade-glassfish-jaxb-runtime
  • centos-upgrade-glassfish-jaxb-txw2
  • centos-upgrade-jackson-annotations
  • centos-upgrade-jackson-core
  • centos-upgrade-jackson-databind
  • centos-upgrade-jackson-jaxrs-json-provider
  • centos-upgrade-jackson-jaxrs-providers
  • centos-upgrade-jackson-module-jaxb-annotations
  • centos-upgrade-jakarta-commons-httpclient
  • centos-upgrade-javassist
  • centos-upgrade-javassist-javadoc
  • centos-upgrade-jss
  • centos-upgrade-jss-debuginfo
  • centos-upgrade-jss-debugsource
  • centos-upgrade-jss-javadoc
  • centos-upgrade-ldapjdk
  • centos-upgrade-ldapjdk-javadoc
  • centos-upgrade-pki-base
  • centos-upgrade-pki-base-java
  • centos-upgrade-pki-ca
  • centos-upgrade-pki-core-debuginfo
  • centos-upgrade-pki-core-debugsource
  • centos-upgrade-pki-kra
  • centos-upgrade-pki-server
  • centos-upgrade-pki-servlet-4-0-api
  • centos-upgrade-pki-servlet-engine
  • centos-upgrade-pki-symkey
  • centos-upgrade-pki-symkey-debuginfo
  • centos-upgrade-pki-tools
  • centos-upgrade-pki-tools-debuginfo
  • centos-upgrade-python-nss-debugsource
  • centos-upgrade-python-nss-doc
  • centos-upgrade-python3-nss
  • centos-upgrade-python3-nss-debuginfo
  • centos-upgrade-python3-pki
  • centos-upgrade-relaxngdatatype
  • centos-upgrade-resteasy
  • centos-upgrade-slf4j
  • centos-upgrade-slf4j-jdk14
  • centos-upgrade-stax-ex
  • centos-upgrade-tomcat
  • centos-upgrade-tomcat-admin-webapps
  • centos-upgrade-tomcat-docs-webapp
  • centos-upgrade-tomcat-el-2-2-api
  • centos-upgrade-tomcat-javadoc
  • centos-upgrade-tomcat-jsp-2-2-api
  • centos-upgrade-tomcat-jsvc
  • centos-upgrade-tomcat-lib
  • centos-upgrade-tomcat-servlet-3-0-api
  • centos-upgrade-tomcat-webapps
  • centos-upgrade-tomcatjss
  • centos-upgrade-velocity
  • centos-upgrade-xalan-j2
  • centos-upgrade-xerces-j2
  • centos-upgrade-xml-commons-apis
  • centos-upgrade-xml-commons-resolver
  • centos-upgrade-xmlstreambuffer
  • centos-upgrade-xsom

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;