It was found that JBoss Web / Apache Tomcat did not check for overflowing values when parsing request content length headers. A remote attacker could use this flaw to perform an HTTP request smuggling attack on a JBoss Web / Apache Tomcat server located behind a reverse proxy that processed the content length header correctly.
Platform | Package | Release Date | Advisory |
---|---|---|---|
Amazon Linux 1 | tomcat7 | 2015-05-14 14:38 | ALAS-2015-526 |
Amazon Linux 1 | tomcat8 | 2015-05-14 14:40 | ALAS-2015-527 |
Score Type | Score | Vector | |
---|---|---|---|
Amazon Linux | CVSSv2 | 5.8 | AV:N/AC:M/Au:N/C:P/I:P/A:N |
NVD | CVSSv2 | 4.3 | AV:N/AC:M/Au:N/C:N/I:P/A:N |