Information Exposure Affecting org.apache.tomcat:coyote package, versions [6,6.0.27)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
64.74% (99th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications

Snyk Learn

Learn about Information Exposure vulnerabilities in an interactive lesson.

Start learning
  • Snyk IDSNYK-JAVA-ORGAPACHETOMCAT-30857
  • published10 Jan 2014
  • disclosed13 Jul 2010
  • creditUnknown

Introduced: 13 Jul 2010

CVE-2010-2227  (opens in a new tab)
CWE-119  (opens in a new tab)

How to fix?

Upgrade org.apache.tomcat:coyote to version 6.0.27 or higher.

Overview

org.apache.tomcat:coyote is a maven plugin for Tomcat Connectors and HTTP parser.

Affected versions of this package are vulnerable to Information Exposure. Does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer."

CVSS Base Scores

version 3.1