Improper Input Validation Affecting org.apache.tomcat:tomcat-coyote Open this link in a new tab package, versions [8.0,8.0.4)


0.0
medium
  • Attack Complexity

    Low

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • snyk-id

    SNYK-JAVA-ORGAPACHETOMCAT-30933

  • published

    8 Sep 2014

  • disclosed

    31 May 2014

  • credit

    Unknown

Overview

org.apache.tomcat:tomcat-coyote java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a "Content-Length: 0" AJP request to trigger a hang in request processing.

References