While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
{
"versions": [
{
"introduced": "8.5.1"
},
{
"last_affected": "8.5.59"
},
{
"introduced": "9.0.1"
},
{
"last_affected": "9.0.35"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone10"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone11"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone12"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone13"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone14"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone15"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone16"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone17"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone18"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone19"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone20"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone21"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone22"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone23"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone24"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone25"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone26"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone27"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone5"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone6"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone7"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone8"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone9"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.36"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.37"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.38"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.39"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone1"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone2"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone3"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone4"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone5"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone6"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone7"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone8"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.0-milestone9"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
},
{
"introduced": "0"
},
{
"last_affected": "10.0"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2020-17527.json"
[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.35-3.39.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.0.35-3.57.3"
}
]
},
{
"events": [
{
"introduced": "3.0.0"
},
{
"last_affected": "3.1.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "21.1.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0.1.5.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "8.0.23"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "18c"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "19c"
}
]
}
]