CVE-2020-17527 (CNNVD-202012-065)
中文标题:
Apache Tomcat 信息泄露漏洞
英文标题:
Apache Tomcat: Request header mix-up between HTTP/2 streams
漏洞描述
中文描述:
Apache Tomcat是美国阿帕奇(Apache)基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat 存在信息泄露漏洞,该漏洞源于可以重用HTTP 2连接上接收到的前一个流的HTTP请求头值,用于与后续流相关联的请求。虽然这很可能会导致错误和HTTP 2连接的关闭,但信息可能会在请求之间泄漏。以下产品及版本受到影响:10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59。
英文描述:
While investigating bug 64830 it was discovered that Apache Tomcat 10.0.0-M1 to 10.0.0-M9, 9.0.0-M1 to 9.0.39 and 8.5.0 to 8.5.59 could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with the subsequent stream. While this would most likely lead to an error and the closure of the HTTP/2 connection, it is possible that information could leak between requests.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | Apache Tomcat 10 10.0.0-M1 to 10.0.0-M9 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:apache_tomcat_10_10.0.0-m1_to_10.0.0-m9:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache Tomcat | Apache Tomcat 9 9.0.0-M1 to 9.0.39 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:apache_tomcat_9_9.0.0-m1_to_9.0.39:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache Tomcat | Apache Tomcat 8.5 8.5.0 to 8.5.59 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:apache_tomcat_8.5_8.5.0_to_8.5.59:*:*:*:*:*:*:*
|
| apache | tomcat | * | - | - |
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
|
| apache | tomcat | 9.0.0 | - | - |
cpe:2.3:a:apache:tomcat:9.0.0:milestone10:*:*:*:*:*:*
|
| apache | tomcat | 9.0.35-3.39.1 | - | - |
cpe:2.3:a:apache:tomcat:9.0.35-3.39.1:*:*:*:*:*:*:*
|
| apache | tomcat | 9.0.35-3.57.3 | - | - |
cpe:2.3:a:apache:tomcat:9.0.35-3.57.3:*:*:*:*:*:*:*
|
| apache | tomcat | 9.0.36 | - | - |
cpe:2.3:a:apache:tomcat:9.0.36:*:*:*:*:*:*:*
|
| apache | tomcat | 9.0.37 | - | - |
cpe:2.3:a:apache:tomcat:9.0.37:*:*:*:*:*:*:*
|
| apache | tomcat | 9.0.38 | - | - |
cpe:2.3:a:apache:tomcat:9.0.38:*:*:*:*:*:*:*
|
| apache | tomcat | 9.0.39 | - | - |
cpe:2.3:a:apache:tomcat:9.0.39:*:*:*:*:*:*:*
|
| apache | tomcat | 10.0.0 | - | - |
cpe:2.3:a:apache:tomcat:10.0.0:milestone1:*:*:*:*:*:*
|
| netapp | element_plug-in | - | - | - |
cpe:2.3:a:netapp:element_plug-in:-:*:*:*:*:vcenter_server:*:*
|
| netapp | oncommand_system_manager | * | - | - |
cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| oracle | blockchain_platform | * | - | - |
cpe:2.3:a:oracle:blockchain_platform:*:*:*:*:*:*:*:*
|
| oracle | communications_cloud_native_core_binding_support_function | 1.10.0 | - | - |
cpe:2.3:a:oracle:communications_cloud_native_core_binding_support_function:1.10.0:*:*:*:*:*:*:*
|
| oracle | communications_cloud_native_core_policy | 1.14.0 | - | - |
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
|
| oracle | communications_instant_messaging_server | 10.0.1.5.0 | - | - |
cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.5.0:*:*:*:*:*:*:*
|
| oracle | instantis_enterprisetrack | 17.1 | - | - |
cpe:2.3:a:oracle:instantis_enterprisetrack:17.1:*:*:*:*:*:*:*
|
| oracle | instantis_enterprisetrack | 17.2 | - | - |
cpe:2.3:a:oracle:instantis_enterprisetrack:17.2:*:*:*:*:*:*:*
|
| oracle | instantis_enterprisetrack | 17.3 | - | - |
cpe:2.3:a:oracle:instantis_enterprisetrack:17.3:*:*:*:*:*:*:*
|
| oracle | mysql_enterprise_monitor | * | - | - |
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
| oracle | sd-wan_edge | 9.0 | - | - |
cpe:2.3:a:oracle:sd-wan_edge:9.0:*:*:*:*:*:*:*
|
| oracle | workload_manager | 18c | - | - |
cpe:2.3:a:oracle:workload_manager:18c:*:*:*:*:*:*:*
|
| oracle | workload_manager | 19c | - | - |
cpe:2.3:a:oracle:workload_manager:19c:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-17527 |
2025-11-11 15:20:26 | 2025-11-11 07:36:08 |
| NVD | nvd_CVE-2020-17527 |
2025-11-11 14:57:06 | 2025-11-11 07:44:34 |
| CNNVD | cnnvd_CNNVD-202012-065 |
2025-11-11 15:10:32 | 2025-11-11 07:56:31 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 信息泄露
- cnnvd_id: 未提取 -> CNNVD-202012-065
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- severity: SeverityLevel.MEDIUM -> SeverityLevel.HIGH
- cvss_score: 未提取 -> 7.5
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 3 -> 27
- references_count: 25 -> 24
- data_sources: ['cve'] -> ['cve', 'nvd']