Korean
<< Back
VID 210256
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 11.0.0.M6. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_11.0.0-m6_security-11 advisory.

- A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. (CVE-2023-34981)

* References:
https://bz.apache.org/bugzilla/show_bug.cgi?id=66512
https://bz.apache.org/bugzilla/show_bug.cgi?id=66591
https://github.com/apache/tomcat/commit/739c7381aed22b7636351caf885ddc519ab6b442
https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M6

* Platforms Affected:
Apache Tomcat Server versions 11.0.x prior to 11.0.0.M6
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (11.0.0.M6 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2023-34981 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)