CVE-2020-1935 (CNNVD-202002-1130)

MEDIUM
中文标题:
Apache Tomcat 环境问题漏洞
英文标题:
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing cod...
CVSS分数: 4.8
发布时间: 2020-02-24 21:11:38
漏洞类型: 环境问题
状态: PUBLISHED
数据质量分数: 0.30
数据版本: v3
漏洞描述
中文描述:

Apache Tomcat是美国阿帕奇(Apache)软件基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat 9.0.0.M1版本至9.0.30版本、8.5.0版本至8.5.50版本和7.0.0版本至7.0.99版本中存在环境问题漏洞。该漏洞源于网络系统或产品的环境因素不合理。

英文描述:

In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.

CWE类型:
CWE-444
标签:
(暂无数据)
受影响产品
厂商 产品 版本 版本范围 平台 CPE
Apache Apache Tomcat Apache Tomcat 9.0.0.M1 to 9.0.30 - - cpe:2.3:a:apache:apache_tomcat:apache_tomcat_9.0.0.m1_to_9.0.30:*:*:*:*:*:*:*
Apache Apache Tomcat 8.5.0 to 8.5.50 - - cpe:2.3:a:apache:apache_tomcat:8.5.0_to_8.5.50:*:*:*:*:*:*:*
Apache Apache Tomcat 7.0.0 to 7.0.99 - - cpe:2.3:a:apache:apache_tomcat:7.0.0_to_7.0.99:*:*:*:*:*:*:*
apache tomcat * - - cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
apache tomcat 9.0.0 - - cpe:2.3:a:apache:tomcat:9.0.0:-:*:*:*:*:*:*
debian debian_linux 8.0 - - cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
debian debian_linux 9.0 - - cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
debian debian_linux 10.0 - - cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
canonical ubuntu_linux 16.04 - - cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
opensuse leap 15.1 - - cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
netapp data_availability_services - - - cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*
netapp oncommand_system_manager * - - cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*
oracle agile_engineering_data_management 6.2.1.0 - - cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*
oracle agile_product_lifecycle_management 9.3.3 - - cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.3:*:*:*:*:*:*:*
oracle agile_product_lifecycle_management 9.3.5 - - cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.5:*:*:*:*:*:*:*
oracle agile_product_lifecycle_management 9.3.6 - - cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.6:*:*:*:*:*:*:*
oracle communications_element_manager 8.1.1 - - cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
oracle communications_element_manager 8.2.0 - - cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
oracle communications_element_manager 8.2.1 - - cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*
oracle communications_instant_messaging_server 10.0.1.4.0 - - cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*
oracle health_sciences_empirica_inspections 1.0.1.2 - - cpe:2.3:a:oracle:health_sciences_empirica_inspections:1.0.1.2:*:*:*:*:*:*:*
oracle health_sciences_empirica_signal 7.3.3 - - cpe:2.3:a:oracle:health_sciences_empirica_signal:7.3.3:*:*:*:*:*:*:*
oracle hospitality_guest_access 4.2.0 - - cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
oracle hospitality_guest_access 4.2.1 - - cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
oracle hyperion_infrastructure_technology 11.1.2.4 - - cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
oracle instantis_enterprisetrack * - - cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
oracle mysql_enterprise_monitor * - - cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
oracle retail_order_broker 15.0 - - cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*
oracle siebel_ui_framework * - - cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*
oracle transportation_management 6.3.7 - - cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*
oracle workload_manager 12.2.0.1 - - cpe:2.3:a:oracle:workload_manager:12.2.0.1:*:*:*:*:*:*:*
oracle workload_manager 18c - - cpe:2.3:a:oracle:workload_manager:18c:*:*:*:*:*:*:*
oracle workload_manager 19c - - cpe:2.3:a:oracle:workload_manager:19c:*:*:*:*:*:*:*
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
[tomcat-announce] 20200224 [SECURITY] CVE-2020-1935 HTTP Request Smuggling mailing-list
cve.org
访问
[debian-lts-announce] 20200304 [SECURITY] [DLA 2133-1] tomcat7 security update mailing-list
cve.org
访问
openSUSE-SU-2020:0345 vendor-advisory
cve.org
访问
[tomee-commits] 20200320 [jira] [Created] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities mailing-list
cve.org
访问
[tomee-commits] 20200323 [jira] [Commented] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities mailing-list
cve.org
访问
DSA-4673 vendor-advisory
cve.org
访问
DSA-4680 vendor-advisory
cve.org
访问
[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update mailing-list
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_CONFIRM
cve.org
访问
[tomcat-users] 20200724 CVE-2020-1935 mailing-list
cve.org
访问
[tomcat-users] 20200724 Re: CVE-2020-1935 mailing-list
cve.org
访问
[tomcat-users] 20200724 RE: CVE-2020-1935 mailing-list
cve.org
访问
[tomcat-users] 20200726 Re: CVE-2020-1935 mailing-list
cve.org
访问
[tomcat-users] 20200727 RE: CVE-2020-1935 mailing-list
cve.org
访问
USN-4448-1 vendor-advisory
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
无标题 x_refsource_MISC
cve.org
访问
[tomcat-dev] 20210428 [Bug 65272] Problems proccessing HTTP request without CR in last versions mailing-list
cve.org
访问
CVSS评分详情
4.8
MEDIUM
CVSS向量: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS版本: 3.1
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2020-02-24 21:11:38
修改时间:
2024-08-04 06:53:59
创建时间:
2025-11-11 15:36:09
更新时间:
2025-11-11 15:55:25
利用信息
暂无可利用代码信息
数据源详情
数据源 记录ID 版本 提取时间
CVE cve_CVE-2020-1935 2025-11-11 15:20:28 2025-11-11 07:36:09
NVD nvd_CVE-2020-1935 2025-11-11 14:56:55 2025-11-11 07:44:35
CNNVD cnnvd_CNNVD-202002-1130 2025-11-11 15:10:22 2025-11-11 07:55:25
版本与语言
当前版本: v3
主要语言: EN
支持语言:
EN ZH
安全公告
暂无安全公告信息
变更历史
v3 CNNVD
2025-11-11 15:55:25
vulnerability_type: 未提取 → 环境问题; cnnvd_id: 未提取 → CNNVD-202002-1130; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
  • vulnerability_type: 未提取 -> 环境问题
  • cnnvd_id: 未提取 -> CNNVD-202002-1130
  • data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2 NVD
2025-11-11 15:44:35
cvss_score: 未提取 → 4.8; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 3 → 33; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
  • cvss_score: 未提取 -> 4.8
  • cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
  • cvss_version: NOT_EXTRACTED -> 3.1
  • affected_products_count: 3 -> 33
  • data_sources: ['cve'] -> ['cve', 'nvd']