Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; - Tomcat honoured the identify encoding; and - Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
{
"versions": [
{
"introduced": "8.5.0"
},
{
"last_affected": "8.5.66"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.46"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
},
{
"introduced": "0"
},
{
"last_affected": "10.0"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
}
]
}{
"versions": [
{
"introduced": "0"
},
{
"last_affected": "8.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "9.1"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.3.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.14.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.14.0"
}
]
},
{
"events": [
{
"introduced": "8.0.0.0"
},
{
"last_affected": "8.5.0.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.0.1.5.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.5.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.0.0.3.0"
}
]
},
{
"events": [
{
"introduced": "8.0.0"
},
{
"last_affected": "8.2.4.0"
}
]
},
{
"events": [
{
"introduced": "8.0.0"
},
{
"last_affected": "8.2.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "21.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "20.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "17.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.2.1.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.2.1.4.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0.25"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0.0.1.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0.0.2.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0.0.3.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"fixed": "5.10.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-NA"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_10"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "5.10.0-update_9"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-33037.json"