446
VMScore

CVE-2020-17527

Published: 03/12/2020 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 7.5 | Impact Score: 3.6 | Exploitability Score: 3.9
VMScore: 446
Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Vulnerability Summary

While investigating bug 64830 it exists that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 9.0.0

apache tomcat 10.0.0

apache tomcat 9.0.36

apache tomcat 9.0.37

apache tomcat 9.0.38

apache tomcat 9.0.39

apache tomcat 9.0.35-3.39.1

apache tomcat 9.0.35-3.57.3

apache tomcat

netapp oncommand system manager

netapp element plug-in -

debian debian linux 9.0

debian debian linux 10.0

oracle instantis enterprisetrack 17.1

oracle instantis enterprisetrack 17.2

oracle instantis enterprisetrack 17.3

oracle sd-wan edge 9.0

oracle workload manager 18c

oracle workload manager 19c

oracle mysql enterprise monitor

oracle communications cloud native core binding support function 1.10.0

oracle communications cloud native core policy 1.14.0

oracle communications instant messaging server 10.0.1.5.0

oracle blockchain platform

Vendor Advisories

Synopsis Moderate: Red Hat JBoss Web Server 541 Security Update Type/Severity Security Advisory: Moderate Topic Red Hat JBoss Web Server 541 zip release is now available for Red Hat Enterprise Linux 7, Red Hat Enterprise Linux 8 and WindowsRed Hat Product Security has rated this release as having a sec ...
Synopsis Moderate: Red Hat JBoss Web Server 541 Security Update Type/Severity Security Advisory: Moderate Topic Updated Red Hat JBoss Web Server 541 packages are now available for Red Hat Enterprise Linux 7, and Red Hat Enterprise Linux 8Red Hat Product Security has rated this release as having a secur ...
Several security issues were fixed in Tomcat ...
Two vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in information disclosure For the stable distribution (buster), these problems have been fixed in version 9031-1~deb10u3 We recommend that you upgrade your tomcat9 packages For the detailed security status of tomcat9 please refer to its security tracke ...
While investigating bug 64830 it was discovered that Apache Tomcat 1000-M1 to 1000-M9, 900-M1 to 9039 and 850 to 8559 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream While this would most likely lead to an error and the closure of ...
While investigating bug 64830 it was discovered that Apache Tomcat 1000-M1 to 1000-M9, 900-M1 to 9039 and 850 to 8559 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream While this would most likely lead to an error and the closure of ...
It was discovered that Apache Tomcat 1000-M1 to 1000-M9, 900-M1 to 9039 and 850 to 8559 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream While this would most likely lead to an error and the closure of the HTTP/2 connection, it is p ...

Github Repositories

References

CWE-200https://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.tomcat.apache.org%3Ehttp://www.openwall.com/lists/oss-security/2020/12/03/3https://security.netapp.com/advisory/ntap-20201210-0003/https://lists.debian.org/debian-lts-announce/2020/12/msg00022.htmlhttps://security.gentoo.org/glsa/202012-23https://www.debian.org/security/2021/dsa-4835https://www.oracle.com/security-alerts/cpuApr2021.htmlhttps://www.oracle.com//security-alerts/cpujul2021.htmlhttps://www.oracle.com/security-alerts/cpujan2022.htmlhttps://www.oracle.com/security-alerts/cpuapr2022.htmlhttps://lists.apache.org/thread.html/r8a227ac6a755a6406c1cc47dd48800e973d4cf13fe7fe68ac59c679c%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/raa0e9ad388c1e6fd1e301b5e080f9439f64cb4178119a86a4801cc53%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rce5ac9a40173651d540babce59f6f3825f12c6d4e886ba00823b11e5%40%3Cannounce.apache.org%3Ehttps://lists.apache.org/thread.html/rd5babd13d7a350b369b2f647b4dd32ce678af42f9aba5389df1ae6ca%40%3Cusers.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rabbe6b3ae6a9795641d7a05c00d2378d5bbbe4240b7e20f09b092cce%40%3Cissues.guacamole.apache.org%3Ehttps://lists.apache.org/thread.html/ra35c8d617b17d59f400112cebadec43ad379f98198b4a9726190d7ee%40%3Cissues.guacamole.apache.org%3Ehttps://lists.apache.org/thread.html/r9fd47f1b03e9b41d16a5cf72659b533887267d3398d963c2fff3abfa%40%3Ccommits.tomee.apache.org%3Ehttps://lists.apache.org/thread.html/r26a2a66339087fc37db3caf201e446d3e83b5cce314371e235ff1784%40%3Ccommits.tomee.apache.org%3Ehttps://lists.apache.org/thread.html/rca833c6d42b7b9ce1563488c0929f29fcc95947d86e5e740258c8937%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d%40%3Cannounce.apache.org%3Ehttps://lists.apache.org/thread.html/r5a285242737ddef4d338236328aaaf3237183e1465a5efafd16b99ed%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/ra9fcdb904dd2e2256ef90b3e4ced279cd464cb0ab63a6c64df5c010d%40%3Cannounce.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/rbba08c4dcef3603e36276d49adda8eedbe458c5104314b4038f697e1%40%3Cusers.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r2d6e05c5ff96f8068a59dfdb3800e9ee8d4e36ce1971783c6e5f9b20%40%3Ccommits.tomee.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2021:0495https://ubuntu.com/security/notices/USN-5360-1https://nvd.nist.gov