Korean
<< Back
VID 22974
Severity 30
Port 80, ...
Protocol TCP
Class WWW
Detailed Description The version of Tomcat installed on the remote host is prior to 8.5.63. It is, therefore, affected by multiple vulnerabilities as referenced in the vendor advisory.

- When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request. (CVE-2021-25122)

- When using Apache Tomcat 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41, 8.5.0 to 8.5.61 or 7.0.0. to 7.0.107 with a configuration edge case that was highly unlikely to be used, the Tomcat instance was still vulnerable to CVE-2020-9494. Note that both the previously published prerequisites for CVE-2020-9484 and the previously published mitigations for CVE-2020-9484 also apply to this issue. (CVE-2021-25329)

* References:
https://github.com/apache/tomcat/commit/93f0cc403a9210d469afc2bd9cf03ab3251c6f35
https://github.com/apache/tomcat/commit/bb0e7c1e0d737a0de7d794572517bce0e91d30fa
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.63

* Platforms Affected:
Apache Tomcat Server versions 8.5.x prior to 8.5.63
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (8.5.63 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2021-25122,CVE-2021-25329 (CVE)
Related URL (SecurityFocus)
Related URL (ISS)