HTTP Request Smuggling Affecting org.apache.tomcat:tomcat-coyote package, versions [10.0.0-M1, 10.0.2) [9.0.0.M1, 9.0.43) [8.5.0, 8.5.63)
Threat Intelligence
EPSS
0.22% (61st
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHETOMCAT-1728263
- published 1 Mar 2021
- disclosed 1 Mar 2021
- credit Unknown
Introduced: 1 Mar 2021
CVE-2021-25122 Open this link in a new tabHow to fix?
Upgrade org.apache.tomcat:tomcat-coyote
to version 10.0.2, 9.0.43, 8.5.63 or higher.
Overview
org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.
Affected versions of this package are vulnerable to HTTP Request Smuggling. When responding to new h2c connection requests, Apache Tomcat could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
References
CVSS Scores
version 3.1