Korean
<< Back
VID 210255
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 10.1.9. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_10.1.9_security-10 advisory.

- A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. (CVE-2023-34981)

* References:
https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
https://github.com/apache/tomcat/commit/f0742f47b98aca943097f7f88e0d1163f57527e3
https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.1.9

* Platforms Affected:
Apache Tomcat Server versions 10.1.x prior to 10.1.9
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (10.1.9 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2023-34981 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)