Vulnerability Description
Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially crafted, invalid trailer header could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Older, EOL versions may also be affected. Users are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.
CVSS Score
MEDIUM
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat | >= 8.5.0, < 8.5.94 |
| Debian | Debian Linux | 10.0 |
Related Weaknesses (CWE)
References
- https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdpVendor Advisory
- http://www.openwall.com/lists/oss-security/2023/10/10/10Mailing ListThird Party Advisory
- https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdpVendor Advisory
- https://lists.debian.org/debian-lts-announce/2023/10/msg00020.htmlMailing ListThird Party Advisory
- https://security.netapp.com/advisory/ntap-20231103-0007/
- https://www.debian.org/security/2023/dsa-5521Third Party Advisory
- https://www.debian.org/security/2023/dsa-5522Third Party Advisory
FAQ
What is CVE-2023-45648?
CVE-2023-45648 is a vulnerability with a CVSS score of 5.3 (MEDIUM). Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not co...
How severe is CVE-2023-45648?
CVE-2023-45648 has been rated MEDIUM with a CVSS base score of 5.3/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2023-45648?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat, Debian Debian Linux.