Improper Input Validation Affecting org.apache.tomcat:tomcat-coyote package, versions [8.5.0,8.5.94) [9.0.0-M1,9.0.81) [10.1.0-M1,10.1.14) [11.0.0-M1,11.0.0-M12)
Threat Intelligence
EPSS
0.27% (69th
percentile)
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-JAVA-ORGAPACHETOMCAT-5959655
- published 11 Oct 2023
- disclosed 10 Oct 2023
- credit Keran Mu, Jianjun Chen
Introduced: 10 Oct 2023
CVE-2023-45648 Open this link in a new tabHow to fix?
Upgrade org.apache.tomcat:tomcat-coyote
to version 8.5.94, 9.0.81, 10.1.14, 11.0.0-M12 or higher.
Overview
org.apache.tomcat:tomcat-coyote is a Tomcat Connectors and HTTP parser.
Affected versions of this package are vulnerable to Improper Input Validation due to the improper handling of HTTP
trailer headers. An attacker can manipulate the server into treating a single request as multiple requests by sending a specially crafted, invalid trailer header. This could lead to request smuggling when the server is behind a reverse proxy.
References
CVSS Scores
version 3.1