CVE-2020-17527

While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
apacheCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 93%
VendorProductVersion
apachetomcat
8.5.1 ≤
𝑥
≤ 8.5.59
apachetomcat
9.0.1 ≤
𝑥
≤ 9.0.35
apachetomcat
9.0.0:milestone10
apachetomcat
9.0.0:milestone11
apachetomcat
9.0.0:milestone12
apachetomcat
9.0.0:milestone13
apachetomcat
9.0.0:milestone14
apachetomcat
9.0.0:milestone15
apachetomcat
9.0.0:milestone16
apachetomcat
9.0.0:milestone17
apachetomcat
9.0.0:milestone18
apachetomcat
9.0.0:milestone19
apachetomcat
9.0.0:milestone20
apachetomcat
9.0.0:milestone21
apachetomcat
9.0.0:milestone22
apachetomcat
9.0.0:milestone23
apachetomcat
9.0.0:milestone24
apachetomcat
9.0.0:milestone25
apachetomcat
9.0.0:milestone26
apachetomcat
9.0.0:milestone27
apachetomcat
9.0.0:milestone5
apachetomcat
9.0.0:milestone6
apachetomcat
9.0.0:milestone7
apachetomcat
9.0.0:milestone8
apachetomcat
9.0.0:milestone9
apachetomcat
9.0.35-3.39.1
apachetomcat
9.0.35-3.57.3
apachetomcat
9.0.36
apachetomcat
9.0.37
apachetomcat
9.0.38
apachetomcat
9.0.39
apachetomcat
10.0.0:milestone1
apachetomcat
10.0.0:milestone2
apachetomcat
10.0.0:milestone3
apachetomcat
10.0.0:milestone4
apachetomcat
10.0.0:milestone5
apachetomcat
10.0.0:milestone6
apachetomcat
10.0.0:milestone7
apachetomcat
10.0.0:milestone8
apachetomcat
10.0.0:milestone9
netappelement_plug-in
-
netapponcommand_system_manager
3.0.0 ≤
𝑥
≤ 3.1.3
debiandebian_linux
9.0
debiandebian_linux
10.0
oracleblockchain_platform
𝑥
< 21.1.2
oraclecommunications_cloud_native_core_binding_support_function
1.10.0
oraclecommunications_cloud_native_core_policy
1.14.0
oraclecommunications_instant_messaging_server
10.0.1.5.0
oracleinstantis_enterprisetrack
17.1
oracleinstantis_enterprisetrack
17.2
oracleinstantis_enterprisetrack
17.3
oraclemysql_enterprise_monitor
𝑥
< 8.0.23
oraclesd-wan_edge
9.0
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
tomcat9
bullseye (security)
9.0.43-2~deb11u10
fixed
bullseye
9.0.43-2~deb11u10
fixed
bookworm
9.0.70-2
fixed
sid
9.0.95-1
fixed
trixie
9.0.95-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat8
noble
dne
mantic
dne
lunar
dne
kinetic
dne
jammy
dne
impish
dne
hirsute
dne
groovy
dne
focal
dne
bionic
needed
xenial
not-affected
trusty
dne
tomcat9
noble
not-affected
mantic
not-affected
lunar
not-affected
kinetic
not-affected
jammy
not-affected
impish
not-affected
hirsute
not-affected
groovy
ignored
focal
Fixed 9.0.31-1ubuntu0.2
released
bionic
Fixed 9.0.16-3ubuntu0.18.04.2
released
xenial
dne
trusty
dne
References