Rapid7 Vulnerability & Exploit Database

Apache Tomcat Duplicate Request Processing Vulnerability

Back to Search

Apache Tomcat Duplicate Request Processing Vulnerability

Severity
4
CVSS
(AV:N/AC:M/Au:N/C:N/I:P/A:N)
Published
02/11/2008
Created
07/25/2018
Added
06/18/2008
Modified
02/13/2015

Description

Certain versions of Apache Tomcat, when using the native APR connector, do not properly handle an empty request to the SSL port. This could allow a remote attacker to trigger handling of a duplicate copy of one of the recent requests.

Solution(s)

  • tomcat-5x-upgrade-5_5_26
  • tomcat-6x-upgrade-6_0_16

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;