HTTP Request Smuggling Affecting tomcat-admin-webapps package, versions <9.0.31-3.42.2
Snyk CVSS
Threat Intelligence
Do your applications use this vulnerable package?
In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.
Test your applications- Snyk ID SNYK-SLES150-TOMCATADMINWEBAPPS-2714485
- published 14 Apr 2022
- disclosed 5 Mar 2020
Introduced: 5 Mar 2020
CVE-2019-17569 Open this link in a new tabHow to fix?
Upgrade SLES:15.0
tomcat-admin-webapps
to version 9.0.31-3.42.2 or higher.
NVD Description
Note: Versions mentioned in the description apply only to the upstream tomcat-admin-webapps
package and not the tomcat-admin-webapps
package as distributed by SLES
.
See How to fix?
for SLES:15.0
relevant fixed versions and status.
The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
References
- https://www.suse.com/security/cve/CVE-2019-17569.html
- https://lists.suse.com/pipermail/sle-security-updates/2020-March/006581.html
- https://www.suse.com/support/update/announcement/2020/suse-su-20200598-1/
- https://bugzilla.suse.com/1164692
- https://bugzilla.suse.com/1164825
- https://bugzilla.suse.com/1164860
- https://bugzilla.suse.com/1165858
- https://www.suse.com/security/cve/CVE-2019-17569/
- https://www.suse.com/security/cve/CVE-2020-1935/
- https://www.suse.com/security/cve/CVE-2020-1938/
- https://www.suse.com/support/security/rating/
- https://lists.apache.org/thread.html/r88def002c5c78534674ca67472e035099fbe088813d50062094a1390%40%3Cannounce.tomcat.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2020/03/msg00006.html
- http://lists.opensuse.org/opensuse-security-announce/2020-03/msg00025.html
- https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743@%3Ccommits.tomee.apache.org%3E
- https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78@%3Ccommits.tomee.apache.org%3E
- https://security.netapp.com/advisory/ntap-20200327-0005/
- https://www.debian.org/security/2020/dsa-4673
- https://www.debian.org/security/2020/dsa-4680
- https://www.oracle.com/security-alerts/cpujul2020.html
- https://www.oracle.com/security-alerts/cpuoct2020.html
- https://www.oracle.com/security-alerts/cpujan2021.html
- https://lists.apache.org/thread.html/r7bc994c965a34876bd94d5ff15b4e1e30b6220a15eb9b47c81915b78%40%3Ccommits.tomee.apache.org%3E
- https://lists.apache.org/thread.html/rc31cbabb46cdc58bbdd8519a8f64b6236b2635a3922bbeba0f0e3743%40%3Ccommits.tomee.apache.org%3E