Unknown
CVE-2021-33037
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2021-33037
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
Apache Tomcat 10.0.0-M1 to 10.0.6, 9.0.0.M1 to 9.0.46 and 8.5.0 to 8.5.66 did not correctly parse the HTTP transfer-encoding request header in some circumstances leading to the possibility to request smuggling when used with a reverse proxy. Specifically: – Tomcat incorrectly ignored the transfer encoding header if the client declared it would only accept an HTTP/1.0 response; – Tomcat honoured the identify encoding; and – Tomcat did not ensure that, if present, the chunked encoding was the final encoding.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- apache,
- debian,
- mcafee,
- oracle
Products
- agile plm 9.3.6,
- communications cloud native core policy 1.14.0,
- communications cloud native core service communication proxy 1.14.0,
- communications diameter signaling router,
- communications instant messaging server 10.0.1.5.0,
- communications policy management 12.5.0,
- communications pricing design center 12.0.0.3.0,
- communications session report manager,
- communications session route manager,
- debian linux 10.0,
- debian linux 9.0,
- epolicy orchestrator,
- epolicy orchestrator 5.10.0,
- graph server and client,
- healthcare translational research 4.1.0,
- hospitality cruise shipboard property management system 20.1.0,
- instantis enterprisetrack 17.1,
- instantis enterprisetrack 17.2,
- instantis enterprisetrack 17.3,
- managed file transfer 12.2.1.3.0,
- managed file transfer 12.2.1.4.0,
- mysql enterprise monitor,
- sd-wan edge 9.0,
- sd-wan edge 9.1,
- secure global desktop 5.6,
- tomcat,
- tomee 8.0.6,
- utilities testing accelerator 6.0.0.1.1,
- utilities testing accelerator 6.0.0.2.2,
- utilities testing accelerator 6.0.0.3.1
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: