Improper Input Validation in Apache Tomcat
Moderate severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Apr 16, 2024
Package
Affected versions
>= 6.0.0, < 6.0.42
>= 7.0.0, < 7.0.55
>= 8.0.0, < 8.0.9
Patched versions
6.0.42
7.0.55
8.0.9
Description
Published by the National Vulnerability Database
Feb 16, 2015
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jul 7, 2022
Last updated
Apr 16, 2024
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java
in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.References