Bug 2440437 (CVE-2026-24733) - CVE-2026-24733 tomcat: security constraint bypass with HTTP/0.9
Summary: CVE-2026-24733 tomcat: security constraint bypass with HTTP/0.9
Keywords:
Status: NEW
Alias: CVE-2026-24733
Product: Security Response
Classification: Other
Component: vulnerability
Version: unspecified
Hardware: All
OS: Linux
low
low
Target Milestone: ---
Assignee: Product Security DevOps Team
QA Contact:
URL:
Whiteboard:
Depends On: 2440786
Blocks:
TreeView+ depends on / blocked
 
Reported: 2026-02-17 20:05 UTC by OSIDB Bzimport
Modified: 2026-02-18 21:38 UTC (History)
0 users

Fixed In Version:
Clone Of:
Environment:
Last Closed:
Embargoed:


Attachments (Terms of Use)

Description OSIDB Bzimport 2026-02-17 20:05:27 UTC
Improper Input Validation vulnerability in Apache Tomcat.


Tomcat did not limit HTTP/0.9 requests to the GET method. If a security 
constraint was configured to allow HEAD requests to a URI but deny GET 
requests, the user could bypass that constraint on GET requests by 
sending a (specification invalid) HEAD request using HTTP/0.9.


This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.14, from 10.1.0-M1 through 10.1.49, from 9.0.0.M1 through 9.0.112.


Older, EOL versions are also affected.

Users are recommended to upgrade to version 11.0.15 or later, 10.1.50 or later or 9.0.113 or later, which fixes the issue.


Note You need to log in before you can comment on or make changes to this bug.