|The Vigil@nce team watches public vulnerabilities impacting your computers, and then offers security solutions, a database and tools to fix them.|
Apache Tomcat: data injection via Content-Length
Synthesis of the vulnerability
An attacker can use two Content-Length headers in order to alter behaviour of HTTP data analysis.
Impacted products: Tomcat, Debian, Fedora, HP-UX, MBS, ePO, Oracle Communications, Solaris, RHEL, JBoss EAP by Red Hat, Ubuntu.
Creation date: 25/02/2014.
Identifiers: BID-65773, c04483248, CERTFR-2014-AVI-244, cpuoct2016, CVE-2013-4286, DSA-2897-1, DSA-3530-1, FEDORA-2014-11048, HPSBUX03150, MDVSA-2015:052, RHSA-2014:0343-01, RHSA-2014:0344-01, RHSA-2014:0345-01, RHSA-2014:0373-01, RHSA-2014:0374-01, RHSA-2014:0429-01, RHSA-2014:0458-01, RHSA-2014:0459-01, RHSA-2014:0511-01, RHSA-2014:0525-01, RHSA-2014:0526-01, RHSA-2014:0527-01, RHSA-2014:0528-01, RHSA-2014:0686-01, RHSA-2015:1009, SB10079, SSRT101681, USN-2130-1, VIGILANCE-VUL-14307.
Description of the vulnerability
The Content-Length header indicates size of HTTP data.
When two or several Content-Length headers are present, each entity (client, proxy, server) can take a different decision:
- use first value
- use last value
These different behaviors for example permit to inject data to corrupt a cache or obtain sensitive information (VIGILANCE-VUL-4047, VIGILANCE-VUL-6675).
The HTTP and AJP connectors of Tomcat server do not ignore these multiple headers, and are thus impacted by this attack family.
Complete Vigil@nce bulletin.... (Free trial)
Computer vulnerabilities tracking service
Vigil@nce provides a networks vulnerabilities alert. Each administrator can customize the list of products for which he wants to receive vulnerability alerts. The Vigil@nce team tracks computer vulnerabilities impacting systems and applications. The technology watch team tracks security threats targeting the computer system.