CVE-2021-33037

Public on 2021-07-12
Modified on 2024-07-29
Description
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
Severity
Medium severity
Medium
CVSS v3 Base Score
4.3
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 2 - Core tomcat Not Affected
Amazon Linux 2 - Tomcat8.5 Extra tomcat 2023-08-21 ALAS2TOMCAT8.5-2023-007 Fixed
Amazon Linux 2 - Tomcat8.5 Extra tomcat 2024-02-01 ALAS2TOMCAT8.5-2024-017 Fixed
Amazon Linux 2 - Tomcat9 Extra tomcat 2023-08-21 ALAS2TOMCAT9-2023-007 Fixed
Amazon Linux 2 - Tomcat9 Extra tomcat 2024-02-01 ALAS2TOMCAT9-2024-011 Fixed
Amazon Linux 1 tomcat7 Not Affected
Amazon Linux 1 tomcat8 2021-09-02 ALAS-2021-1535 Fixed
Amazon Linux 1 tomcat80 No Fix Planned
Amazon Linux 2023 tomcat9 2023-02-17 ALAS2023-2023-059 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv3 4.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L
NVD CVSSv2 5.0 AV:N/AC:L/Au:N/C:N/I:P/A:N
NVD CVSSv3 5.3 CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N