Due to the current gap in continued funding from the U.S. National Science Foundation (NSF), the NSF Unidata Program Center has temporarily paused most operations. See NSF Unidata Pause in Most Operations for details.
Good morning all, Another Tomcat CVE reported. Please upgrade to the latest release, especially if you are running your TDS behind a reverse proxy. ---------- Forwarded message --------- From: Mark Thomas <markt@xxxxxxxxxx> Date: Tue, Nov 28, 2023 at 8:32 AM Subject: [SECURITY] CVE-2023-46589 Apache Tomcat - Request Smuggling To: users@xxxxxxxxxxxxxxxxx <users@xxxxxxxxxxxxxxxxx> Cc: <announce@xxxxxxxxxx>, announce@xxxxxxxxxxxxxxxxx < announce@xxxxxxxxxxxxxxxxx>, Tomcat Developers List <dev@xxxxxxxxxxxxxxxxx> CVE-2023-46589 Apache Tomcat - Request Smuggling Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 11.0.0-M1 to 11.0.0-M10 Apache Tomcat 10.1.0-M1 to 10.1.15 Apache Tomcat 9.0.0-M1 to 9.0.82 Apache Tomcat 8.5.0 to 8.5.95 Description: Tomcat did not correctly parse HTTP trailer headers. A specially crafted trailer header that exceeded the header size limit could cause Tomcat to treat a single request as multiple requests leading to the possibility of request smuggling when behind a reverse proxy. Mitigation: Users of the affected versions should apply one of the following mitigations: - Upgrade to Apache Tomcat 11.0.0-M11 or later - Upgrade to Apache Tomcat 10.1.16 or later - Upgrade to Apache Tomcat 9.0.83 or later - Upgrade to Apache Tomcat 8.5.96 or later Credit: This vulnerability was reported responsibly to the Tomcat security team by Norihito Aimoto (OSSTech Corporation). History: 2023-11-28 Original advisory References: [1] https://tomcat.apache.org/security-11.html [2] https://tomcat.apache.org/security-10.html [3] https://tomcat.apache.org/security-9.html [4] https://tomcat.apache.org/security-8.html
thredds
archives: