Bug 237079 - (CVE-2005-2090) CVE-2005-2090 tomcat multiple content-length header poisioning
CVE-2005-2090 tomcat multiple content-length header poisioning
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
All All
medium Severity medium
: ---
: ---
Assigned To: Red Hat Product Security
: Security
Depends On: 237086 237088 237089 237090 237109 238402 238574 240208 390331 390341 390351 390361 414311 430730 430731 449337 470236 470237
Blocks: 444136
  Show dependency treegraph
Reported: 2007-04-19 07:50 EDT by Mark J. Cox (Product Security)
Modified: 2013-05-08 14:26 EDT (History)
0 users

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Last Closed: 2013-05-08 14:26:06 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---

Attachments (Terms of Use)
the proposed patch (3.71 KB, patch)
2007-04-19 07:53 EDT, Mark J. Cox (Product Security)
no flags Details | Diff

  None (edit)
Description Mark J. Cox (Product Security) 2007-04-19 07:50:17 EDT
From http://tomcat.apache.org/security-5.html

Fixed in Apache Tomcat 5.5.23

Information disclosure CVE-2005-2090

Requests with multiple content-length headers should be rejected as invalid.
When multiple components (firewalls, caches, proxies and Tomcat) process a
sequence of requests where one or more requests contain multiple content-length
headers and several components do not reject the request and make different
decisions as to which content-length leader to use an attacker can poision a
web-cache, perform an XSS attack and obtain senstive information from requests
other then their own. Tomcat now returns 400 for requests with multiple
content-length headers.

Affects: 5.0.0-5.0.HEAD, 5.5.0-5.5.22
Comment 2 Mark J. Cox (Product Security) 2007-04-19 07:53:21 EDT
Created attachment 152992 [details]
the proposed patch
Comment 3 Mark J. Cox (Product Security) 2007-04-23 06:35:30 EDT
advisory text: "Tomcat was found to accept multiple content-length headers in a
request.  This could allow attackers to poison a web-cache, bypass web
application firewall protection, or conduct cross-site scripting attacks. 
Comment 4 Jean-frederic Clere 2007-05-02 02:27:09 EDT
important: Directory traversal   CVE-2007-0450
Comment 5 Jean-frederic Clere 2007-05-02 02:33:01 EDT
That is a complex attack.
Comment 11 errata-xmlrpc 2010-08-04 17:32:26 EDT
This issue has been addressed in following products:

  Red Hat Certificate System 7.3

Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html
Comment 12 Vincent Danen 2013-05-08 14:26:06 EDT
Please see https://access.redhat.com/security/cve/CVE-2005-2090 for a list of other products that contain this fix.

Note You need to log in before you can comment on or make changes to this bug.