5.3
CVSSv3

CVE-2021-33037

Published: 12/07/2021 Updated: 07/11/2023
CVSS v2 Base Score: 5 | Impact Score: 2.9 | Exploitability Score: 10
CVSS v3 Base Score: 5.3 | Impact Score: 1.4 | Exploitability Score: 3.9
VMScore: 445
Vector: AV:N/AC:L/Au:N/C:N/I:P/A:N

Vulnerability Summary

It exists that Tomcat did not properly validate the input length. An attacker could possibly use this to trigger an infinite loop, resulting in a denial of service. (CVE-2020-9494, CVE-2021-25329, CVE-2021-41079)

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat

apache tomee 8.0.6

debian debian linux 9.0

debian debian linux 10.0

oracle managed file transfer 12.2.1.3.0

oracle instantis enterprisetrack 17.1

oracle instantis enterprisetrack 17.2

oracle instantis enterprisetrack 17.3

oracle agile plm 9.3.6

oracle communications policy management 12.5.0

oracle sd-wan edge 9.0

oracle managed file transfer 12.2.1.4.0

oracle secure global desktop 5.6

oracle hospitality cruise shipboard property management system 20.1.0

oracle communications pricing design center 12.0.0.3.0

oracle communications session route manager

oracle mysql enterprise monitor

oracle communications session report manager

oracle sd-wan edge 9.1

oracle utilities testing accelerator 6.0.0.2.2

oracle utilities testing accelerator 6.0.0.3.1

oracle utilities testing accelerator 6.0.0.1.1

oracle communications diameter signaling router

oracle communications cloud native core policy 1.14.0

oracle communications cloud native core service communication proxy 1.14.0

oracle communications instant messaging server 10.0.1.5.0

oracle graph server and client

oracle healthcare translational research 4.1.0

mcafee epolicy orchestrator 5.10.0

mcafee epolicy orchestrator

Vendor Advisories

Debian Bug report logs - #991046 tomcat9: CVE-2021-33037 CVE-2021-30640 CVE-2021-30639 Package: src:tomcat9; Maintainer for src:tomcat9 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Mühlenhoff <jmm@inutilorg> Date: Tue, 13 Jul 2021 12:12:27 UTC Severity: grave Tags: ...
Several security issues were fixed in Tomcat ...
Two vulnerabilities were discovered in the Tomcat servlet and JSP engine, which could result in HTTP request smuggling, bypass of logout restrictions or authentications using variations of a valid user name For the stable distribution (buster), these problems have been fixed in version 9031-1~deb10u5 We recommend that you upgrade your tomcat9 p ...
Synopsis Important: Red Hat support for Spring Boot 2510 update Type/Severity Security Advisory: Important Topic An update is now available for Red Hat OpenShift Application RuntimesRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, which gives a ...
Synopsis Important: Red Hat Fuse 7110 release and security update Type/Severity Security Advisory: Important Topic A minor version update (from 710 to 711) is now available for Red Hat Fuse The purpose of this text-only errata is to inform you about the security issues fixed in this releaseRed Hat Product Security has rated this update ...
Apache Tomcat 1000-M1 to 1006, 900M1 to 9046 and 850 to 8566 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only ...
Apache Tomcat 1000-M1 to 1006, 900M1 to 9046 and 850 to 8566 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy Specifically: - Tomcat incorrectly ignored the transfer encoding header if the client declared it would only ...
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm This issue affects Apache Tomcat 1000-M1 to 1005; 900M1 to 9045; 850 to 8565 (CVE-2021-30640) Apache Tomcat 1000-M1 to 1006, 900M1 to ...
No description is available for this CVE ...
A vulnerability (CVE-2021-33037) exists in Cosminexus Component Container Affected products and versions are listed below Please upgrade your version to the appropriate version These vulnerabilities exist in Cosminexus Component Container which is a component product of other Hitachi products For details about the fixed version about Cosminex ...
Multiple vulnerabilities have been found in Hitachi Ops Center Common Services CVE-2020-1695, CVE-2020-1723, CVE-2020-1725, CVE-2020-10770, CVE-2020-14302, CVE-2020-15522, CVE-2020-25711, CVE-2020-27838, CVE-2020-28052, CVE-2020-28491, CVE-2021-3424, CVE-2021-3712, CVE-2021-20195, CVE-2021-20202, CVE-2021-20222, CVE-2021-20262, CVE-2021-21290, C ...

References

CWE-444https://lists.apache.org/thread.html/r612a79269b0d5e5780c62dfd34286a8037232fec0bc6f1a7e60c9381%40%3Cannounce.tomcat.apache.org%3Ehttps://www.oracle.com//security-alerts/cpujul2021.htmlhttps://lists.debian.org/debian-lts-announce/2021/08/msg00009.htmlhttps://www.debian.org/security/2021/dsa-4952https://security.netapp.com/advisory/ntap-20210827-0007/https://www.oracle.com/security-alerts/cpuoct2021.htmlhttps://kc.mcafee.com/corporate/index?page=content&id=SB10366https://www.oracle.com/security-alerts/cpujan2022.htmlhttps://www.oracle.com/security-alerts/cpuapr2022.htmlhttps://security.gentoo.org/glsa/202208-34https://lists.apache.org/thread.html/r40f921575aee8d7d34e53182f862c45cbb8f3d898c9d4e865c2ec262%40%3Ccommits.tomee.apache.org%3Ehttps://lists.apache.org/thread.html/re01e7e93154e8bdf78a11a23f9686427bd3d51fc6e12c508645567b7%40%3Ccommits.tomee.apache.org%3Ehttps://lists.apache.org/thread.html/rd0dfea39829bc0606c936a16f6fca338127c86c0a1083970b45ac8d2%40%3Ccommits.tomee.apache.org%3Ehttps://lists.apache.org/thread.html/r290aee55b72811fd19e75ac80f6143716c079170c5671b96932ed44b%40%3Ccommits.tomee.apache.org%3Ehttps://lists.apache.org/thread.html/rf1b54fd3f52f998ca4829159a88cc4c23d6cef5c6447d00948e75c97%40%3Ccommits.tomee.apache.org%3Ehttps://lists.apache.org/thread.html/rc6ef52453bb996a98cb45442871a1db56b7c349939e45d829bf9ae37%40%3Ccommits.tomee.apache.org%3Ehttps://bugs.debian.org/cgi-bin/bugreport.cgi?bug=991046https://nvd.nist.govhttps://ubuntu.com/security/notices/USN-5360-1