Apache Tomcat Allows Remote Attackers to Spoof AJP Requests
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Feb 21, 2024
Package
Affected versions
>= 7.0.0, <= 7.0.20
>= 6.0.0, <= 6.0.33
>= 5.0.0, <= 5.5.33
Patched versions
7.0.21
6.0.34
5.5.34
Description
Published by the National Vulnerability Database
Aug 31, 2011
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jan 17, 2024
Last updated
Feb 21, 2024
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
References