Upstream information
Description
Jakarta Tomcat 5.0.19 (Coyote/1.1) and Tomcat 4.1.24 (Coyote/1.0) allows remote attackers to poison the web cache, bypass web application firewall protection, and conduct XSS attacks via an HTTP request with both a "Transfer-Encoding: chunked" header and a Content-Length header, which causes Tomcat to incorrectly handle and forward the body of the request in a way that causes the receiving server to process it as a separate HTTP request, aka "HTTP Request Smuggling."SUSE information
Overall state of this security issue: Resolved
This issue is currently rated as having moderate severity.
| CVSS detail | National Vulnerability Database | 
|---|---|
| Base Score | 4.3 | 
| Vector | AV:N/AC:M/Au:N/C:N/I:P/A:N | 
| Access Vector | Network | 
| Access Complexity | Medium | 
| Authentication | None | 
| Confidentiality Impact | None | 
| Integrity Impact | Partial | 
| Availability Impact | None | 
SUSE Security Advisories:
- SUSE-SR:2008:005, published Thu, 06 Mar 2008 13:00:00 +0000
 - TID7006398, published Sat May 19 21:49:58 CEST 2018
 
SUSE Timeline for this CVE
CVE page created: Fri Jun 28 01:33:43 2013CVE page last modified: Mon Oct 6 18:14:40 2025