Skip to content

Improper Neutralization of CRLF Sequences in HTTP Headers in Apache Tomcat

Moderate severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Feb 22, 2024

Package

maven org.apache.tomcat:tomcat (Maven)

Affected versions

< 6.0.40
>= 7.0.0, < 7.0.54
>= 8.0.0, < 8.0.6

Patched versions

6.0.40
7.0.54
8.0.6

Description

Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header.

References

Published by the National Vulnerability Database May 31, 2014
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jul 7, 2022
Last updated Feb 22, 2024

Severity

Moderate

EPSS score

0.463%
(76th percentile)

Weaknesses

CVE ID

CVE-2014-0099

GHSA ID

GHSA-xh5x-j8jf-pcpx

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.