HTTP Request Smuggling Affecting org.apache.tomcat.embed:tomcat-embed-core Open this link in a new tab package, versions [10.0.0-M1, 10.0.2) [9.0.0.M1, 9.0.43) [8.5.0, 8.5.63)
Attack Complexity
High
User Interaction
Required
Integrity
High
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications-
snyk-id
SNYK-JAVA-ORGAPACHETOMCATEMBED-1080638
-
published
1 Mar 2021
-
disclosed
1 Mar 2021
-
credit
Unknown
Introduced: 1 Mar 2021
CVE-2021-25122 Open this link in a new tabHow to fix?
Upgrade org.apache.tomcat.embed:tomcat-embed-core
to version 10.0.2, 9.0.43, 8.5.63 or higher.
Overview
org.apache.tomcat.embed:tomcat-embed-core is a Core Tomcat implementation.
Affected versions of this package are vulnerable to HTTP Request Smuggling. When responding to new h2c connection requests, Apache Tomcat could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.