Version 11.0.1

tomcat-coyote

Tomcat Connectors and HTTP parser

Install Instructions

mvn install tomcat-coyote
Language Java

Find tomcat-coyote vulnerabilities in your supply chain.

Scan for Free

tomcat-coyote Vulnerabilities

Sort by
icon CVE (Latest)
  • icon CVE (Latest)
  • icon CVE (Oldest)
  • icon CVSS Score (Highest)
  • icon CVSS Score (Lowest)
CVE question mark icon CVSS Score question mark icon CWE(s) question mark icon EPSS Score question mark icon EPSS % question mark icon Impacted Versions
CVE-2011-3190 High 7.3 CWE-264 0.01408 0.86169
  • 7.0.0–7.0.20
CVE-2011-3375 Medium 5.3 CWE-200 0.0025 0.64038
  • 7.0.0–7.0.21
CVE-2012-2733 Medium 5.3 CWE-20 0.04484 0.92354
  • 7.0.0–7.0.25
CVE-2012-3544 Medium 5.3 CWE-20 0.08407 0.94399
  • 7.0.0–7.0.28
CVE-2012-4534 Low 3.7 CWE-399 0.1276 0.95454
  • 7.0.0–7.0.27
CVE-2013-2185 High 7.5 CWE-20, CWE-434 0.00345 0.7134
  • 8.0.0-RC1–8.5.100
  • 7.0.0–7.0.109
CVE-2013-4286 Medium 5.4 CWE-20 0.00525 0.76783
  • 7.0.0–7.0.42
CVE-2013-4322 Medium 4.3 CWE-20 0.88301 0.98941
  • 7.0.0–7.0.47
CVE-2013-4444 High 7.3 CWE-94 0.08074 0.94297
  • 7.0.0–7.0.39
CVE-2014-0050 High 7.5 CWE-264 0.41599 0.97351
  • 8.0.0-RC1–8.0.1
  • 7.0.0–7.0.50
CVE-2014-0075 Medium 5.3 CWE-189 0.0639 0.93607
  • 8.0.0-RC1–8.0.3
  • 7.0.0–7.0.52
CVE-2014-0099 Medium 4.3 CWE-189 0.00463 0.75161
  • 7.0.0–7.0.52
CVE-2016-6816 High 7.1 CWE-20, CWE-200 0.00786 0.81271
  • 9.0.0.M1–9.0.0.M9
  • 8.0.1–8.5.6
  • 7.0.0–7.0.72
CVE-2017-5647 High 7.5 CWE-200 0.00283 0.68202
  • 9.0.0.M1–9.0.0.M9
  • 8.0.1–8.5.12
  • 7.0.0–7.0.76
CVE-2017-6056 High 7.5 CWE-835, CWE-399, CWE-19 0.01341 0.85799
  • 7.0.0–7.0.57
CVE-2020-1938 High 9.8 CWE-20, CWE-269 0.97422 0.99969
  • 9.0.1–9.0.30
  • 8.0.1–8.5.50
  • 7.0.0–7.0.99
CVE-2011-0534 Medium 5.3 CWE-399 0.01031 0.83662
  • 7.0.0–7.0.6
CVE-2011-1475 Medium 5.3 CWE-20 0.00548 0.7729
  • 7.0.0–7.0.11
CVE-2011-2526 Medium 5.3 CWE-20 0.00046 0.18904
  • 7.0.0–7.0.16
CVE-2010-2227 Medium 6.5 CWE-119 0.68921 0.98165
  • 7.0.0
CVE-2022-42252 High 7.5 CWE-20, CWE-444 0.0024 0.61513
  • 10.0.0–10.1.0-M8
  • 9.0.0.M1–9.0.67
  • 8.5.0–8.5.82
CVE-2023-44487 High 7.5 CWE-400 0.81393 0.9859
  • 11.0.0-M1–11.0.0-M9
  • 10.0.0–10.1.13
  • 9.0.1–9.0.80
  • 8.5.0–8.5.93
CVE-2024-24549 High 7.5 CWE-20 0.00045 0.15737
  • 11.0.0-M1–11.0.0-M9
  • 10.1.0–10.1.18
  • 9.0.0.M1–9.0.85
  • 8.5.0–8.5.98
CVE-2023-24998 High 7.5 CWE-770 0.01602 0.87041
  • 11.0.0-M3–11.0.0-M4
  • 10.1.0–10.1.4
  • 9.0.0.M1–9.0.70
  • 8.5.85–8.5.87
CVE-2023-28709 High 7.5 CWE-193 0.02455 0.8971
  • 8.5.85–8.5.87
CVE-2016-6817 High 7.5 CWE-119, CWE-400 0.01651 0.87225
  • 9.0.0.M1–9.0.0.M9
  • 8.5.0–8.5.6
CVE-2017-5650 High 7.5 CWE-404, CWE-399 0.6356 0.97999
  • 9.0.0.M1–9.0.0.M9
  • 8.5.0–8.5.12
CVE-2017-5651 High 9.8 CWE-19 0.00613 0.78521
  • 9.0.0.M1–9.0.0.M9
  • 8.5.0–8.5.12
CVE-2019-0199 High 7.5 CWE-400 0.23425 0.96582
  • 9.0.0.M1–9.0.14
  • 8.5.0–8.5.37
CVE-2019-10072 High 7.5 CWE-667 0.1698 0.9604
  • 9.0.0.M1–9.0.19
  • 8.5.0–8.5.39
CVE-2020-11996 High 7.5 CWE-400 0.00962 0.8308
  • 10.0.0-M1–10.0.0-M5
  • 9.0.0.M1–9.0.35
  • 8.5.0–8.5.55
CVE-2020-13943 Medium 4.3 0.00116 0.46138
  • 10.0.0-M1–10.0.0-M7
  • 9.0.0.M1–9.0.37
  • 8.5.0–8.5.57
CVE-2020-17527 High 7.5 CWE-200 0.00255 0.64482
  • 10.0.0-M1–10.0.0-M9
  • 9.0.1–9.0.39
  • 8.5.0–8.5.59
CVE-2019-17569 Medium 4.8 CWE-444 0.0035 0.71545
  • 9.0.29–9.0.30
  • 8.5.49–8.5.50
  • 7.0.99
CVE-2020-1935 Medium 4.8 CWE-444 0.00732 0.80563
  • 9.0.29–9.0.30
  • 8.5.49–8.5.50
  • 7.0.99
CVE-2016-8745 High 7.5 CWE-200, CWE-388 0.01456 0.8641
  • 8.0.0-RC1–8.0.39
CVE-2014-0095 Medium 5 CWE-20 0.10655 0.95036
  • 8.0.0-RC1–8.0.3
CVE-2016-8747 High 7.5 CWE-200 0.00333 0.70804
  • 9.0.0.M11–9.0.0.M15
  • 8.5.8–8.5.9
CVE-2023-34981 High 7.5 CWE-732 0.00281 0.68023
  • 8.5.88
CVE-2024-34750 High 7.5 CWE-755, CWE-400 0.00043 0.10859
  • 11.0.0-M1–11.0.0-M9
  • 10.1.0–10.1.24
  • 9.0.0.M1–9.0.89
CVE-2024-21733 Medium 5.3 CWE-209 0.00488 0.75806
  • 9.0.0.M11–9.0.43
CVE-2024-52317 Medium 6.5 CWE-326 0.00043 0.10859
  • 11.0.0-M24–11.0.0-M26
  • 10.1.28–10.1.30
  • 9.0.93–9.0.95

tomcat-coyote Vulnerability Remediation Guidance

CVE Description Full list of Impacted Versions Fix
CVE-2024-52317 Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. 11.0.0-M26, 9.0.94, 10.1.28, 11.0.0-M24, 9.0.93, 10.1.30, 9.0.95, 11.0.0-M25 (Show all) Major → 11.0.0
CVE-2024-34750 Improper Handling of Exceptional Conditions, Uncontrolled Resource Consumption vulnerability in Apache Tomcat. When processing an HTTP/2 stream, Tomcat did not handle some cases of excessive HTTP headers correctly. This led to a miscounting of active HTTP/2 streams which in turn led to the use of an incorrect infinite timeout which allowed connections to remain open which should have been closed. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M20, from 10.1.0-M1 through 10.1.24, from 9.0.0-M1 through 9.0.89. Users are recommended to upgrade to version 11.0.0-M21, 10.1.25 or 9.0.90, which fixes the issue. 9.0.0.M1, 9.0.0.M10, 9.0.0.M11, 9.0.0.M9, 9.0.0.M8, 9.0.0.M15, 9.0.0.M17, 9.0.0.M18 (Show all) Patch → 9.0.90
CVE-2024-24549 Denial of Service due to improper input validation vulnerability for HTTP/2 requests in Apache Tomcat. When processing an HTTP/2 request, if the request exceeded any of the configured limits for headers, the associated HTTP/2 stream was not reset until after all of the headers had been processed.This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M16, from 10.1.0-M1 through 10.1.18, from 9.0.0-M1 through 9.0.85, from 8.5.0 through 8.5.98. Users are recommended to upgrade to version 11.0.0-M17, 10.1.19, 9.0.86 or 8.5.99 which fix the issue. 8.5.76, 8.5.96, 8.5.81, 8.5.87, 8.5.98, 8.5.97, 8.5.95, 8.5.94 (Show all) Patch → 9.0.90
CVE-2024-21733 Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43. Users are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue. 9.0.0.M11, 9.0.0.M15, 9.0.0.M17, 9.0.0.M18, 9.0.0.M13, 9.0.37, 9.0.24, 9.0.11 (Show all) Patch → 9.0.90
CVE-2023-44487 The HTTP/2 protocol allows a denial of service (server resource consumption) because request cancellation can reset many streams quickly, as exploited in the wild in August through October 2023. 8.5.76, 8.5.81, 8.5.87, 8.5.78, 8.5.71, 8.5.4, 8.5.15, 8.5.58 (Show all) Patch → 9.0.90
CVE-2023-34981 A regression in the fix for bug 66512 in Apache Tomcat 11.0.0-M5, 10.1.8, 9.0.74 and 8.5.88 meant that, if a response did not include any HTTP headers no AJP SEND_HEADERS messare woudl be sent for the response which in turn meant that at least one AJP proxy (mod_proxy_ajp) would use the response headers from the previous request leading to an information leak. 8.5.88 Patch → 9.0.90
CVE-2023-28709 The fix for CVE-2023-24998 was incomplete for Apache Tomcat 11.0.0-M2 to 11.0.0-M4, 10.1.5 to 10.1.7, 9.0.71 to 9.0.73 and 8.5.85 to 8.5.87. If non-default HTTP connector settings were used such that the maxParameterCount could be reached using query string parameters and a request was submitted that supplied exactly maxParameterCount parameters in the query string, the limit for uploaded request parts could be bypassed with the potential for a denial of service to occur. 8.5.87, 8.5.85, 8.5.86 Patch → 9.0.90
CVE-2023-24998 Apache Commons FileUpload before 1.5 does not limit the number of request parts to be processed resulting in the possibility of an attacker triggering a DoS with a malicious upload or series of uploads. Note that, like all of the file upload limits, the new configuration option (FileUploadBase#setFileCountMax) is not enabled by default and must be explicitly configured. 8.5.87, 8.5.85, 8.5.86, 9.0.0.M1, 9.0.0.M10, 9.0.0.M11, 9.0.0.M9, 9.0.0.M8 (Show all) Patch → 9.0.90
CVE-2022-42252 If Apache Tomcat 8.5.0 to 8.5.82, 9.0.0-M1 to 9.0.67, 10.0.0-M1 to 10.0.26 or 10.1.0-M1 to 10.1.0 was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header. 8.5.76, 8.5.81, 8.5.78, 8.5.71, 8.5.4, 8.5.15, 8.5.58, 8.5.49 (Show all) Patch → 9.0.90
CVE-2020-1938 When using the Apache JServ Protocol (AJP), care must be taken when trusting incoming connections to Apache Tomcat. Tomcat treats AJP connections as having higher trust than, for example, a similar HTTP connection. If such connections are available to an attacker, they can be exploited in ways that may be surprising. In Apache Tomcat 9.0.0.M1 to 9.0.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99, Tomcat shipped with an AJP Connector enabled by default that listened on all configured IP addresses. It was expected (and recommended in the security guide) that this Connector would be disabled if not required. This vulnerability report identified a mechanism that allowed: - returning arbitrary files from anywhere in the web application - processing any file in the web application as a JSP Further, if the web application allowed file upload and stored those files within the web application (or the attacker was able to control the content of the web application by some other means) then this, along with the ability to process a file as a JSP, made remote code execution possible. It is important to note that mitigation is only required if an AJP port is accessible to untrusted users. Users wishing to take a defence-in-depth approach and block the vector that permits returning arbitrary files and execution as JSP may upgrade to Apache Tomcat 9.0.31, 8.5.51 or 7.0.100 or later. A number of changes were made to the default AJP Connector configuration in 9.0.31 to harden the default configuration. It is likely that users upgrading to 9.0.31, 8.5.51 or 7.0.100 or later will need to make small changes to their configurations. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2020-1935 In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. 8.5.49, 8.5.50, 7.0.99, 9.0.30, 9.0.29 Patch → 9.0.90
CVE-2020-17527 While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests. 8.5.4, 8.5.15, 8.5.58, 8.5.49, 8.5.27, 8.5.21, 8.5.0, 8.5.50 (Show all) Patch → 9.0.90
CVE-2020-13943 If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources. 8.5.4, 8.5.15, 8.5.49, 8.5.27, 8.5.21, 8.5.0, 8.5.50, 8.5.42 (Show all) Patch → 9.0.90
CVE-2020-11996 A specially crafted sequence of HTTP/2 requests sent to Apache Tomcat 10.0.0-M1 to 10.0.0-M5, 9.0.0.M1 to 9.0.35 and 8.5.0 to 8.5.55 could trigger high CPU usage for several seconds. If a sufficient number of such requests were made on concurrent HTTP/2 connections, the server could become unresponsive. 8.5.4, 8.5.15, 8.5.49, 8.5.27, 8.5.21, 8.5.0, 8.5.50, 8.5.42 (Show all) Patch → 9.0.90
CVE-2019-17569 The refactoring present in Apache Tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression. The result of the regression was that invalid Transfer-Encoding headers were incorrectly processed leading to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely. 8.5.49, 8.5.50, 7.0.99, 9.0.30, 9.0.29 Patch → 9.0.90
CVE-2019-10072 The fix for CVE-2019-0199 was incomplete and did not address HTTP/2 connection window exhaustion on write in Apache Tomcat versions 9.0.0.M1 to 9.0.19 and 8.5.0 to 8.5.40 . By not sending WINDOW_UPDATE messages for the connection window (stream 0) clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. 8.5.4, 8.5.15, 8.5.27, 8.5.21, 8.5.0, 8.5.34, 8.5.9, 8.5.37 (Show all) Patch → 9.0.90
CVE-2019-0199 The HTTP/2 implementation in Apache Tomcat 9.0.0.M1 to 9.0.14 and 8.5.0 to 8.5.37 accepted streams with excessive numbers of SETTINGS frames and also permitted clients to keep streams open without reading/writing request/response data. By keeping streams open for requests that utilised the Servlet API's blocking I/O, clients were able to cause server-side threads to block eventually leading to thread exhaustion and a DoS. 8.5.4, 8.5.15, 8.5.27, 8.5.21, 8.5.0, 8.5.34, 8.5.9, 8.5.37 (Show all) Patch → 9.0.90
CVE-2017-6056 It was discovered that a programming error in the processing of HTTPS requests in the Apache Tomcat servlet and JSP engine may result in denial of service via an infinite loop. The denial of service is easily achievable as a consequence of backporting a CVE-2016-6816 fix but not backporting the fix for Tomcat bug 57544. Distributions affected by this backporting issue include Debian (before 7.0.56-3+deb8u8 and 8.0.14-1+deb8u7 in jessie) and Ubuntu. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2017-5651 In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the refactoring of the HTTP connectors introduced a regression in the send file processing. If the send file processing completed quickly, it was possible for the Processor to be added to the processor cache twice. This could result in the same Processor being used for multiple requests which in turn could lead to unexpected errors and/or response mix-up. 8.5.4, 8.5.0, 8.5.9, 8.5.12, 8.5.11, 8.5.3, 8.5.8, 8.5.6 (Show all) Patch → 9.0.90
CVE-2017-5650 In Apache Tomcat 9.0.0.M1 to 9.0.0.M18 and 8.5.0 to 8.5.12, the handling of an HTTP/2 GOAWAY frame for a connection did not close streams associated with that connection that were currently waiting for a WINDOW_UPDATE before allowing the application to write more data. These waiting streams each consumed a thread. A malicious client could therefore construct a series of HTTP/2 requests that would consume all available processing threads. 8.5.4, 8.5.0, 8.5.9, 8.5.12, 8.5.11, 8.5.3, 8.5.8, 8.5.6 (Show all) Patch → 9.0.90
CVE-2017-5647 A bug in the handling of the pipelined requests in Apache Tomcat 9.0.0.M1 to 9.0.0.M18, 8.5.0 to 8.5.12, 8.0.0.RC1 to 8.0.42, 7.0.0 to 7.0.76, and 6.0.0 to 6.0.52, when send file was used, results in the pipelined request being lost when send file processing of the previous request completed. This could result in responses appearing to be sent for the wrong request. For example, a user agent that sent requests A, B and C could see the correct response for request A, the response for request C for request B and no response for request C. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2016-8747 An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be associated with a different request. 8.5.9, 8.5.8, 9.0.0.M11, 9.0.0.M15, 9.0.0.M13 Patch → 9.0.90
CVE-2016-8745 A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions. 8.0.30, 8.0.21, 8.0.0-RC10, 8.0.38, 8.0.36, 8.0.32, 8.0.28, 8.0.23 (Show all) Patch → 9.0.90
CVE-2016-6817 The HTTP/2 header parser in Apache Tomcat 9.0.0.M1 to 9.0.0.M11 and 8.5.0 to 8.5.6 entered an infinite loop if a header was received that was larger than the available buffer. This made a denial of service attack possible. 8.5.4, 8.5.0, 8.5.3, 8.5.6, 8.5.2, 8.5.5, 9.0.0.M1, 9.0.0.M10 (Show all) Patch → 9.0.90
CVE-2016-6816 The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2014-0099 Integer overflow in java/org/apache/tomcat/util/buf/Ascii.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4, when operated behind a reverse proxy, allows remote attackers to conduct HTTP request smuggling attacks via a crafted Content-Length HTTP header. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2014-0095 java/org/apache/coyote/ajp/AbstractAjpProcessor.java in Apache Tomcat 8.x before 8.0.4 allows remote attackers to cause a denial of service (thread consumption) by using a "Content-Length: 0" AJP request to trigger a hang in request processing. 8.0.0-RC10, 8.0.3, 8.0.0-RC5, 8.0.0-RC3, 8.0.0-RC1, 8.0.1 Patch → 9.0.90
CVE-2014-0075 Integer overflow in the parseChunkHeader function in java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat before 6.0.40, 7.x before 7.0.53, and 8.x before 8.0.4 allows remote attackers to cause a denial of service (resource consumption) via a malformed chunk size in chunked transfer coding of a request during the streaming of data. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2014-0050 MultipartStream.java in Apache Commons FileUpload before 1.3.1, as used in Apache Tomcat, JBoss Web, and other products, allows remote attackers to cause a denial of service (infinite loop and CPU consumption) via a crafted Content-Type header that bypasses a loop's intended exit conditions. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2013-4444 Unrestricted file upload vulnerability in Apache Tomcat 7.x before 7.0.40, in certain situations involving outdated java.io.File code and a custom JMX configuration, allows remote attackers to execute arbitrary code by uploading and accessing a JSP file. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2013-4322 Apache Tomcat before 6.0.39, 7.x before 7.0.50, and 8.x before 8.0.0-RC10 processes chunked transfer coding without properly handling (1) a large total amount of chunked data or (2) whitespace characters in an HTTP header value within a trailer field, which allows remote attackers to cause a denial of service by streaming data. NOTE: this vulnerability exists because of an incomplete fix for CVE-2012-3544. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2013-4286 Apache Tomcat before 6.0.39, 7.x before 7.0.47, and 8.x before 8.0.0-RC3, when an HTTP connector or AJP connector is used, does not properly handle certain inconsistent HTTP request headers, which allows remote attackers to trigger incorrect identification of a request's length and conduct request-smuggling attacks via (1) multiple Content-Length headers or (2) a Content-Length header and a "Transfer-Encoding: chunked" header. NOTE: this vulnerability exists because of an incomplete fix for CVE-2005-2090. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2013-2185 The readObject method in the DiskFileItem class in Apache Tomcat and JBoss Web, as used in Red Hat JBoss Enterprise Application Platform 6.1.0 and Red Hat JBoss Portal 6.0.0, allows remote attackers to write to arbitrary files via a NULL byte in a file name in a serialized instance, a similar issue to CVE-2013-2186. NOTE: this issue is reportedly disputed by the Apache Tomcat team, although Red Hat considers it a vulnerability. The dispute appears to regard whether it is the responsibility of applications to avoid providing untrusted data to be deserialized, or whether this class should inherently protect against this issue 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2012-4534 org/apache/tomcat/util/net/NioEndpoint.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28, when the NIO connector is used in conjunction with sendfile and HTTPS, allows remote attackers to cause a denial of service (infinite loop) by terminating the connection during the reading of a response. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.22, 7.0.2, 7.0.16 (Show all) Patch → 9.0.90
CVE-2012-3544 Apache Tomcat 6.x before 6.0.37 and 7.x before 7.0.30 does not properly handle chunk extensions in chunked transfer coding, which allows remote attackers to cause a denial of service by streaming data. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.28, 7.0.22, 7.0.2 (Show all) Patch → 9.0.90
CVE-2012-2733 java/org/apache/coyote/http11/InternalNioInputBuffer.java in the HTTP NIO connector in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.28 does not properly restrict the request-header size, which allows remote attackers to cause a denial of service (memory consumption) via a large amount of header data. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.25, 7.0.22, 7.0.2, 7.0.16 (Show all) Patch → 9.0.90
CVE-2011-3375 Apache Tomcat 6.0.30 through 6.0.33 and 7.x before 7.0.22 does not properly perform certain caching and recycling operations involving request objects, which allows remote attackers to obtain unintended read access to IP address and HTTP header information in opportunistic circumstances by reading TCP data. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.2, 7.0.16, 7.0.12, 7.0.6 (Show all) Patch → 9.0.90
CVE-2011-3190 Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request. 7.0.19, 7.0.5, 7.0.0, 7.0.8, 7.0.2, 7.0.16, 7.0.12, 7.0.6 (Show all) Patch → 9.0.90
CVE-2011-2526 Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.19, when sendfile is enabled for the HTTP APR or HTTP NIO connector, does not validate certain request attributes, which allows local users to bypass intended file access restrictions or cause a denial of service (infinite loop or JVM crash) by leveraging an untrusted web application. 7.0.5, 7.0.0, 7.0.8, 7.0.2, 7.0.16, 7.0.12, 7.0.6, 7.0.4 (Show all) Patch → 9.0.90
CVE-2011-1475 The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users." 7.0.5, 7.0.0, 7.0.8, 7.0.2, 7.0.6, 7.0.4, 7.0.11 Patch → 9.0.90
CVE-2011-0534 Apache Tomcat 7.0.0 through 7.0.6 and 6.0.0 through 6.0.30 does not enforce the maxHttpHeaderSize limit for requests involving the NIO HTTP connector, which allows remote attackers to cause a denial of service (OutOfMemoryError) via a crafted request. 7.0.5, 7.0.0, 7.0.2, 7.0.6, 7.0.4 Patch → 9.0.90
CVE-2010-2227 Apache Tomcat 5.5.0 through 5.5.29, 6.0.0 through 6.0.27, and 7.0.0 beta does not properly handle an invalid Transfer-Encoding header, which allows remote attackers to cause a denial of service (application outage) or obtain sensitive information via a crafted header that interferes with "recycling of a buffer." 7.0.0 Patch → 9.0.90

Instantly see if these tomcat-coyote vulnerabilities affect your code.

Scan for Free

Dependencies

Packages using versions of tomcat-coyote affected by its vulnerabilities

Dependent Packages
org.apache.tomcat:tomcat-servlet-api:11.0.1
org.apache.tomcat:tomcat-jni:11.0.1
org.apache.tomcat:tomcat-juli:11.0.1
org.apache.tomcat:tomcat-util:11.0.1