Apache Tomcat reports:
If Tomcat was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.
The CVSS score for this vulnerability is 7.5 High
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
FreeBSD | any | noarch | tomcat | =Â 8.5.0 | UNKNOWN |
FreeBSD | any | noarch | tomcat | <Â 8.5.83 | UNKNOWN |
FreeBSD | any | noarch | tomcat85 | =Â 8.5.0 | UNKNOWN |
FreeBSD | any | noarch | tomcat85 | <Â 8.5.83 | UNKNOWN |
FreeBSD | any | noarch | tomcat9 | =Â 9.0.0-M1 | UNKNOWN |
FreeBSD | any | noarch | tomcat9 | <Â 9.0.68 | UNKNOWN |
FreeBSD | any | noarch | tomcat10 | =Â 10.0.0-M1 | UNKNOWN |
FreeBSD | any | noarch | tomcat10 | <Â 10.0.27 | UNKNOWN |
FreeBSD | any | noarch | tomcat101 | =Â 10.1.0-M1 | UNKNOWN |
FreeBSD | any | noarch | tomcat101 | <Â 10.1.1 | UNKNOWN |