BIT-tomcat-2023-34981

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/tomcat/BIT-tomcat-2023-34981.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-tomcat-2023-34981
Aliases
Published
2024-03-06T11:08:35.200Z
Modified
2025-05-20T10:02:07.006Z
Summary
Apache Tomcat: AJP response header mix-up
Details

A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SENDHEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (modproxy_ajp) would use the response headers from the previous request leading to an information leak.

Database specific
{
    "cpes": [
        "cpe:2.3:a:apache:tomcat:10.1.8:*:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:11.0.0:milestone5:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:8.5.88:*:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:9.0.74:*:*:*:*:*:*:*",
        "cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*"
    ],
    "severity": "High"
}
References

Affected packages

Bitnami / tomcat

Package

Name
tomcat
Purl
pkg:bitnami/tomcat

Severity

  • 7.5 (High) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
8.5.88
Fixed
8.5.89
Introduced
9.0.74
Fixed
9.0.75
Introduced
10.1.8
Fixed
10.1.9
Introduced
11.0.0-milestone5
Fixed
11.0.0