GHSA-qhqv-q4xg-f6g7

Suggest an improvement
Source
https://github.com/advisories/GHSA-qhqv-q4xg-f6g7
Import Source
https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-qhqv-q4xg-f6g7/GHSA-qhqv-q4xg-f6g7.json
JSON Data
https://api.osv.dev/v1/vulns/GHSA-qhqv-q4xg-f6g7
Aliases
  • CVE-2005-3164
Published
2022-05-01T02:15:08Z
Modified
2023-11-08T03:56:45.932705Z
Summary
Apache Tomcat AJP Connector Information Leak
Details

The AJP connector in Apache Tomcat 4.0.1 through 4.0.6 and 4.1.0 through 4.1.36, as used in Hitachi Cosminexus Application Server and standalone, does not properly handle when a connection is broken before request body data is sent in a POST request, which can lead to an information leak when "unsuitable request body data" is used for a different request, possibly related to Java Servlet pages.

References

Affected packages

Maven / org.apache.tomcat:tomcat

Package

Name
org.apache.tomcat:tomcat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tomcat/tomcat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.0.1
Last affected
4.0.6

Maven / org.apache.tomcat:tomcat

Package

Name
org.apache.tomcat:tomcat
View open source insights on deps.dev
Purl
pkg:maven/org.apache.tomcat/tomcat

Affected ranges

Type
ECOSYSTEM
Events
Introduced
4.1.0
Last affected
4.1.36