HTTP Request Smuggling Affecting org.apache.tomcat:tomcat-coyote package, versions [10.0.0-M1, 10.0.2) [9.0.0.M1, 9.0.43) [8.5.0, 8.5.63)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.Test your applications
- Snyk ID SNYK-JAVA-ORGAPACHETOMCAT-1728263
- published 1 Mar 2021
- disclosed 1 Mar 2021
- credit Unknown
How to fix?
org.apache.tomcat:tomcat-coyote to version 10.0.2, 9.0.43, 8.5.63 or higher.
org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.
Affected versions of this package are vulnerable to HTTP Request Smuggling. When responding to new h2c connection requests, Apache Tomcat could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.