728x90
CVE-2020-17527 Apache Tomcat HTTP/2 Request header mix-up Severity: Moderate Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 10.0.0-M1 to 10.0.0-M9 Apache Tomcat 9.0.0.M5 to 9.0.39 Apache Tomcat 8.5.1 to 8.5.59 Description: While investigating Bug 64830 it was discovered that Apache Tomcat could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests. Mitigation: - Upgrade to Apache Tomcat 10.0.0-M10 or later - Upgrade to Apache Tomcat 9.0.40 or later - Upgrade to Apache Tomcat 8.5.60 or later Credit: This issue was identified by the Apache Tomcat Security Team. References: [1] http://tomcat.apache.org/security-10.html [2] http://tomcat.apache.org/security-9.html [3] http://tomcat.apache.org/security-8.html
728x90
'취약점 정보2' 카테고리의 다른 글
Rockwell Automation 취약점 보안 주의 권고 (0) | 2021.03.02 |
---|---|
OpenSSL 보안 권고 [2020 년 12 월 8 일]EDIPARTYNAME NULL 포인터 역 참조 (CVE-2020-1971) (0) | 2020.12.09 |
Samba 취약점 보안 업데이트 권고 (0) | 2020.09.23 |
MS 윈도우 서버 Netlogon 취약점 보안 업데이트 권고 (0) | 2020.09.21 |
BLURtooth Vulnerability (0) | 2020.09.14 |