CVE-2021-25122
Severity CVSS v4.0:
Pending analysis
Type:
CWE-200
Information Leak / Disclosure
Publication date:
01/03/2021
Last modified:
07/11/2023
Description
When responding to new h2c connection requests, Apache Tomcat versions 10.0.0-M1 to 10.0.0, 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61 could duplicate request headers and a limited amount of request body from one request to another meaning user A and user B could both see the results of user A's request.
Impact
Base Score 3.x
7.50
Severity 3.x
HIGH
Base Score 2.0
5.00
Severity 2.0
MEDIUM
Vulnerable products and versions
| CPE | From | Up to |
|---|---|---|
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 8.5.0 (including) | 8.5.61 (including) |
| cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* | 9.0.0 (including) | 9.0.41 (including) |
| cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone16:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone17:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone18:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone19:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone2:*:*:*:*:*:* | ||
| cpe:2.3:a:apache:tomcat:9.0.0:milestone20:*:*:*:*:*:* |
To consult the complete list of CPE names with products and versions, see this page
References to Advisories, Solutions, and Tools
- http://www.openwall.com/lists/oss-security/2021/03/01/1
- https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.apache.org%3E
- https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cannounce.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cdev.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/r7b95bc248603360501f18c8eb03bb6001ec0ee3296205b34b07105b7%40%3Cusers.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rcd90bf36b1877e1310b87ecd14ed7bbb15da52b297efd9f0e7253a3b%40%3Cusers.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rd0463f9a5cbc02a485404c4b990f0da452e5ac5c237808edba11c947%40%3Cusers.tomcat.apache.org%3E
- https://lists.apache.org/thread.html/rf6d5d57b114678d8898005faef31e9fd6d7c981fcc4ccfc3bc272fc9%40%3Cdev.tomcat.apache.org%3E
- https://lists.debian.org/debian-lts-announce/2021/03/msg00018.html
- https://security.gentoo.org/glsa/202208-34
- https://security.netapp.com/advisory/ntap-20210409-0002/
- https://www.debian.org/security/2021/dsa-4891
- https://www.oracle.com//security-alerts/cpujul2021.html
- https://www.oracle.com/security-alerts/cpujan2022.html
- https://www.oracle.com/security-alerts/cpuoct2021.html



