Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.tomcat/coyote
  4. ›
  5. CVE-2023-46589

CVE-2023-46589: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

November 28, 2023 (updated January 5, 2024)

Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M10, from 10.1.0-M1 through 10.1.15, from 9.0.0-M1 through 9.0.82 and from 8.5.0 through 8.5.95 does not correctly parse HTTP trailer headers. A trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy.

Users are recommended to upgrade to version 11.0.0-M11 onwards, 10.1.16 onwards, 9.0.83 onwards or 8.5.96 onwards, which fix the issue.

References

  • lists.apache.org/thread/0rqq6ktozqc42ro8hhxdmmdjm1k1tpxr
  • nvd.nist.gov/vuln/detail/CVE-2023-46589
  • www.openwall.com/lists/oss-security/2023/11/28/2

Code Behaviors & Features

Detect and mitigate CVE-2023-46589 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 8.5.0 before 8.5.96, all versions starting from 9.0.0 before 9.0.83, all versions starting from 10.1.0 before 10.1.16, version 11.0.0

Solution

Unfortunately, there is no solution available yet.

Impact 7.5 HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

Learn more about CVSS

Weakness

  • CWE-444: Inconsistent Interpretation of HTTP Requests ('HTTP Request/Response Smuggling')

Source file

maven/org.apache.tomcat/coyote/CVE-2023-46589.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Tue, 13 May 2025 12:14:36 +0000.