CVE-2021-33037

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.

References

https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3E

https://www.oracle.com//security-alerts/cpujul2021.html

https://lists.apache.org/thread.html/[email protected]%3Ccommits.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.tomee.apache.org%3E

https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html

https://www.debian.org/security/2021/dsa-4952

https://security.netapp.com/advisory/ntap-20210827-0007/

https://lists.apache.org/thread.html/[email protected]%3Ccommits.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.tomee.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Ccommits.tomee.apache.org%3E

https://www.oracle.com/security-alerts/cpuoct2021.html

https://kc.mcafee.com/corporate/index?page=content&id=SB10366

Details

Source: MITRE

Published: 2021-07-12

Updated: 2021-12-02

Type: CWE-444

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

CVSS v3

Base Score: 5.3

Vector: CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N

Impact Score: 1.4

Exploitability Score: 3.9

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions from 8.5.0 to 8.5.66 (inclusive)

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions up to 9.0.46 (inclusive)

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* versions up to 10.0.6 (inclusive)

Configuration 2

OR

cpe:2.3:a:apache:tomee:8.0.6:*:*:*:*:*:*:*

Configuration 3

OR

cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*

cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*

Configuration 4

OR

cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:* versions from 8.0.0.0 to 8.5.0 (inclusive)

cpe:2.3:a:oracle:communications_policy_management:12.5.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*

cpe:2.3:a:oracle:communications_session_report_manager:*:*:*:*:*:*:*:* versions from 8.0.0 to 8.2.4.0 (inclusive)

cpe:2.3:a:oracle:communications_session_route_manager:*:*:*:*:*:*:*:* versions from 8.0.0 to 8.2.4 (inclusive)

cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*

cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*

cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*

cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:* versions up to 8.0.25 (inclusive)

cpe:2.3:a:oracle:secure_global_desktop:5.6:*:*:*:*:*:*:*

Configuration 5

OR

cpe:2.3:a:mcafee:epolicy_orchestrator:*:*:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:-:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_1:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_10:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_2:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_3:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_4:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_5:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_6:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_7:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_8:*:*:*:*:*:*

cpe:2.3:a:mcafee:epolicy_orchestrator:5.10.0:update_9:*:*:*:*:*:*

Tenable Plugins

View all (25 total)

IDNameProductFamilySeverity
155756RHEL 7 : Red Hat JBoss Web Server 5.6.0 Security release (Important) (RHSA-2021:4861)NessusRed Hat Local Security Checks
medium
155657openSUSE 15 Security Update : tomcat (openSUSE-SU-2021:1490-1)NessusSuSE Local Security Checks
medium
155466SUSE SLES15 Security Update : tomcat (SUSE-SU-2021:3670-1)NessusSuSE Local Security Checks
medium
155463SUSE SLES15 Security Update : tomcat (SUSE-SU-2021:3672-1)NessusSuSE Local Security Checks
medium
155462SUSE SLES15 Security Update : tomcat (SUSE-SU-2021:3669-1)NessusSuSE Local Security Checks
medium
155382openSUSE 15 Security Update : tomcat (openSUSE-SU-2021:3672-1)NessusSuSE Local Security Checks
medium
154907SUSE SLES12 Security Update : tomcat (SUSE-SU-2021:3602-1)NessusSuSE Local Security Checks
medium
154672F5 Networks BIG-IP : Apache Tomcat vulnerability (K32469285)NessusF5 Networks Local Security Checks
medium
154267Oracle MySQL Enterprise Monitor (Oct 2021 CPU)NessusCGI abuses
high
153161Amazon Linux AMI : tomcat8 (ALAS-2021-1535)NessusAmazon Linux Local Security Checks
medium
152418Debian DSA-4952-1 : tomcat9 - security updateNessusDebian Local Security Checks
medium
152386Photon OS 1.0: Apache PHSA-2021-1.0-0420NessusPhotonOS Local Security Checks
medium
152380Photon OS 3.0: Apache PHSA-2021-3.0-0277NessusPhotonOS Local Security Checks
medium
152371Photon OS 2.0: Apache PHSA-2021-2.0-0375NessusPhotonOS Local Security Checks
medium
152349Debian DLA-2733-1 : tomcat8 - LTS security updateNessusDebian Local Security Checks
medium
152204FreeBSD : tomcat -- HTTP request smuggling in multiple versions (d34bef0b-f312-11eb-b12b-fc4dd43e2b6a)NessusFreeBSD Local Security Checks
medium
152183Apache Tomcat 8.5.0 < 8.5.68 vulnerabilityNessusWeb Servers
medium
152182Apache Tomcat 9.0.0.M1 < 9.0.48 vulnerabilityNessusWeb Servers
medium
112898Apache Tomcat 8.5.x < 8.5.68 Request SmugglingWeb Application ScanningComponent Vulnerability
medium
112897Apache Tomcat 9.0.0.M1 < 9.0.48 Request SmugglingWeb Application ScanningComponent Vulnerability
medium
112896Apache Tomcat 10.0.0-M1 < 10.0.7 Request SmugglingWeb Application ScanningComponent Vulnerability
medium
701356Apache Tomcat < 10.0.7 VulnerabilityNessus Network MonitorWeb Servers
medium
701355Apache Tomcat < 8.5.68 VulnerabilityNessus Network MonitorWeb Servers
medium
701354Apache Tomcat < 9.0.48 VulnerabilityNessus Network MonitorWeb Servers
medium
151501Apache Tomcat 10.0.0.M1 < 10.0.7 vulnerabilityNessusWeb Servers
medium