Korean
<< Back
VID 210253
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 8.5.89. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_8.5.89_security-8 advisory.

- A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. (CVE-2023-34981)

* References:
https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
https://github.com/apache/tomcat/commit/2214c8030522aa9b2a367dfa5d9acff1a03666ae
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.89

* Platforms Affected:
Apache Tomcat Server versions 8.5.x prior to 8.5.89
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (8.5.89 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2023-34981 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)