Goal Reached Thanks to every supporter — we hit 100%!

Goal: 1000 CNY · Raised: 1000 CNY

100.0%

CVE-2023-45648— Apache Tomcat: Trailer header parsing too lenient

EPSS 59.48% · P98
Get alerts for future matching vulnerabilitiesLog in to subscribe

I. Basic Information for CVE-2023-45648

Vulnerability Information

Have questions about the vulnerability? See if Shenlong's analysis helps!
View Shenlong Deep Dive ↗

Although we use advanced large model technology, its output may still contain inaccurate or outdated information.Shenlong tries to ensure data accuracy, but please verify and judge based on the actual situation.

Vulnerability Title
Apache Tomcat: Trailer header parsing too lenient
Source: NVD (National Vulnerability Database)
Vulnerability Description
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.
Source: NVD (National Vulnerability Database)
CVSS Information
N/A
Source: NVD (National Vulnerability Database)
Vulnerability Type
输入验证不恰当
Source: NVD (National Vulnerability Database)
Vulnerability Title
Apache Tomcat 输入验证错误漏洞
Source: CNNVD (China National Vulnerability Database)
Vulnerability Description
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat存在安全漏洞,该漏洞源于没有正确解析HTTP尾部标头,导致攻击者可以利用特制的尾部标头造成反向代理走私。受影响的产品和版本:Apache Tomcat 11.0.0-M1至11.0.0-M11版本,10.1.0-M1至10.1.13版本,9.0.0.M1至9.0.81版本,8.5.0至8.5.93版本。
Source: CNNVD (China National Vulnerability Database)
CVSS Information
N/A
Source: CNNVD (China National Vulnerability Database)
Vulnerability Type
N/A
Source: CNNVD (China National Vulnerability Database)

Affected Products

VendorProductAffected VersionsCPESubscribe
Apache Software FoundationApache Tomcat 11.0.0-M1 ~ 11.0.0-M11 -

II. Public POCs for CVE-2023-45648

#POC DescriptionSource LinkShenlong Link
1Apache Tomcat from versions 8.5.0 to 8.5.93, 9.0.0-M1 to 9.0.81, 10.1.0-M1 to 10.1.13, and 11.0.0-M1 to 11.0.0-M11 contain an improper input validation caused by incorrect parsing of HTTP trailer headers, letting attackers craft headers to cause request smuggling, exploit requires sending malicious trailer headers. https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2023/CVE-2023-45648.yamlPOC Details
AI-Generated POCPremium

No public POC found.

Login to generate AI POC

III. Intelligence Information for CVE-2023-45648

登录查看更多情报信息。

Same Patch Batch · Apache Software Foundation · 2023-10-10 · 3 CVEs total

CVE-2023-42795Apache Tomcat: Failure during request clean-up leads to sensitive data leaking to subseque
CVE-2023-42794Apache Tomcat: FileUpload: DoS due to accumulation of temporary files on Windows

IV. Related Vulnerabilities

V. Comments for CVE-2023-45648

No comments yet


Leave a comment