VID |
210256 |
Severity |
40 |
Port |
80, ... |
Protocol |
TCP |
Class |
WWW |
Detailed Description |
The version of Tomcat installed on the remote host is prior to 11.0.0.M6. It is, therefore, affected by a vulnerability as referenced in the fixed_in_apache_tomcat_11.0.0-m6_security-11 advisory.
- A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. (CVE-2023-34981)
* References: https://bz.apache.org/bugzilla/show_bug.cgi?id=66512 https://bz.apache.org/bugzilla/show_bug.cgi?id=66591 https://github.com/apache/tomcat/commit/739c7381aed22b7636351caf885ddc519ab6b442 https://tomcat.apache.org/security-11.html#Fixed_in_Apache_Tomcat_11.0.0-M6
* Platforms Affected: Apache Tomcat Server versions 11.0.x prior to 11.0.0.M6 Any operating system Any version |
Recommendation |
Upgrade to the latest version of Apache Tomcat Server (11.0.0.M6 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/ |
Related URL |
CVE-2023-34981 (CVE) |
Related URL |
(SecurityFocus) |
Related URL |
(ISS) |
|