-
CVSS Score
-| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.tomcat.embed:tomcat-embed-core | maven | >= 8.5.0, < 8.5.83 | 8.5.83 |
| org.apache.tomcat.embed:tomcat-embed-core | maven | >= 9.0.0-M1, < 9.0.68 | 9.0.68 |
| org.apache.tomcat.embed:tomcat-embed-core | maven | >= 10.0.0-M1, < 10.0.27 | 10.0.27 |
| org.apache.tomcat.embed:tomcat-embed-core | maven | >= 10.1.0-M1, < 10.1.1 | 10.1.1 |
| org.apache.tomcat:tomcat-coyote | maven | >= 9.0.0-M1, < 9.0.68 | 9.0.68 |
| org.apache.tomcat:tomcat-coyote | maven | >= 10.0.0-M1, < 10.0.27 | 10.0.27 |
| org.apache.tomcat:tomcat-coyote | maven | >= 10.1.0-M1, < 10.1.1 | 10.1.1 |
The vulnerability stems from improper Content-Length header validation when rejectIllegalHeader=false. The commit diff shows critical modifications to skipLine() and its callers in Http11InputBuffer.java. The original implementation failed to: 1) check if the invalid header was Content-Length, and 2) enforce mandatory rejection for malformed Content-Length as required by RFC 9112. The functions skipLine() and parseHeader() were directly modified in the patch to add this specific validation, making them the clear vulnerable points.
Ongoing coverage of React2Shell