The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpes": [
"cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.40:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.42:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.43:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.44:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.45:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.46:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.47:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.0:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.10:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.13:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.16:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.19:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.25:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.2:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.30:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.31:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.32:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.33:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.34:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.35:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.36:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.37:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.38:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.4:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.5:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.6:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.7:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.8:*:*:*:*:*:*:*",
"cpe:2.3:a:apache:tomcat:8.0.9:*:*:*:*:*:*:*"
],
"vendor_product": "apache:tomcat",
"extracted_events": [
{
"last_affected": "6.0.0"
},
{
"last_affected": "6.0.1"
},
{
"last_affected": "6.0.2"
},
{
"last_affected": "6.0.3"
},
{
"last_affected": "6.0.4"
},
{
"last_affected": "6.0.5"
},
{
"last_affected": "6.0.6"
},
{
"last_affected": "6.0.7"
},
{
"last_affected": "6.0.8"
},
{
"last_affected": "6.0.9"
},
{
"last_affected": "6.0.10"
},
{
"last_affected": "6.0.11"
},
{
"last_affected": "6.0.12"
},
{
"last_affected": "6.0.13"
},
{
"last_affected": "6.0.14"
},
{
"last_affected": "6.0.15"
},
{
"last_affected": "6.0.16"
},
{
"last_affected": "6.0.17"
},
{
"last_affected": "6.0.18"
},
{
"last_affected": "6.0.19"
},
{
"last_affected": "6.0.20"
},
{
"last_affected": "6.0.21"
},
{
"last_affected": "6.0.22"
},
{
"last_affected": "6.0.23"
},
{
"last_affected": "6.0.24"
},
{
"last_affected": "6.0.25"
},
{
"last_affected": "6.0.26"
},
{
"last_affected": "6.0.27"
},
{
"last_affected": "6.0.28"
},
{
"last_affected": "6.0.29"
},
{
"last_affected": "6.0.30"
},
{
"last_affected": "6.0.31"
},
{
"last_affected": "6.0.32"
},
{
"last_affected": "6.0.33"
},
{
"last_affected": "6.0.34"
},
{
"last_affected": "6.0.35"
},
{
"last_affected": "6.0.36"
},
{
"last_affected": "6.0.37"
},
{
"last_affected": "6.0.38"
},
{
"last_affected": "6.0.39"
},
{
"last_affected": "6.0.40"
},
{
"last_affected": "6.0.41"
},
{
"last_affected": "6.0.42"
},
{
"last_affected": "6.0.43"
},
{
"last_affected": "6.0.44"
},
{
"last_affected": "6.0.45"
},
{
"last_affected": "6.0.46"
},
{
"last_affected": "6.0.47"
},
{
"last_affected": "8.0.0"
},
{
"last_affected": "8.0.1"
},
{
"last_affected": "8.0.2"
},
{
"last_affected": "8.0.3"
},
{
"last_affected": "8.0.4"
},
{
"last_affected": "8.0.5"
},
{
"last_affected": "8.0.6"
},
{
"last_affected": "8.0.7"
},
{
"last_affected": "8.0.8"
},
{
"last_affected": "8.0.9"
},
{
"last_affected": "8.0.10"
},
{
"last_affected": "8.0.11"
},
{
"last_affected": "8.0.12"
},
{
"last_affected": "8.0.13"
},
{
"last_affected": "8.0.14"
},
{
"last_affected": "8.0.15"
},
{
"last_affected": "8.0.16"
},
{
"last_affected": "8.0.17"
},
{
"last_affected": "8.0.18"
},
{
"last_affected": "8.0.19"
},
{
"last_affected": "8.0.20"
},
{
"last_affected": "8.0.21"
},
{
"last_affected": "8.0.22"
},
{
"last_affected": "8.0.23"
},
{
"last_affected": "8.0.24"
},
{
"last_affected": "8.0.25"
},
{
"last_affected": "8.0.26"
},
{
"last_affected": "8.0.27"
},
{
"last_affected": "8.0.28"
},
{
"last_affected": "8.0.29"
},
{
"last_affected": "8.0.30"
},
{
"last_affected": "8.0.31"
},
{
"last_affected": "8.0.32"
},
{
"last_affected": "8.0.33"
},
{
"last_affected": "8.0.34"
},
{
"last_affected": "8.0.35"
},
{
"last_affected": "8.0.36"
},
{
"last_affected": "8.0.37"
},
{
"last_affected": "8.0.38"
}
]
}
]
}