Unknown
CVE-2020-17527
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below:
Add References:
CVE-2020-17527
MITRE ATT&CK
Collection
Command and Control
Credential Access
Defense Evasion
Discovery
Execution
Exfiltration
Impact
Initial Access
Lateral Movement
Persistence
Privilege Escalation
Topic Tags
Description
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
Add Assessment
No one has assessed this topic. Be the first to add your voice to the community.
CVSS V3 Severity and Metrics
General Information
Vendors
- apache,
- debian,
- netapp,
- oracle
Products
- blockchain platform,
- communications cloud native core binding support function 1.10.0,
- communications cloud native core policy 1.14.0,
- communications instant messaging server 10.0.1.5.0,
- debian linux 10.0,
- debian linux 9.0,
- element plug-in -,
- instantis enterprisetrack 17.1,
- instantis enterprisetrack 17.2,
- instantis enterprisetrack 17.3,
- mysql enterprise monitor,
- oncommand system manager,
- sd-wan edge 9.0,
- tomcat,
- tomcat 10.0.0,
- tomcat 9.0.0,
- tomcat 9.0.35-3.39.1,
- tomcat 9.0.35-3.57.3,
- tomcat 9.0.36,
- tomcat 9.0.37,
- tomcat 9.0.38,
- tomcat 9.0.39,
- workload manager 18c,
- workload manager 19c
References
Advisory
Miscellaneous
Additional Info
Technical Analysis
Report as Emergent Threat Response
Report as Exploited in the Wild
CVE ID
AttackerKB requires a CVE ID in order to pull vulnerability data and references from the CVE list and the National Vulnerability Database. If available, please supply below: