CVE-2020-1935 (CNNVD-202002-1130)
MEDIUM
中文标题:
Apache Tomcat 环境问题漏洞
英文标题:
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing cod...
CVSS分数:
4.8
发布时间:
2020-02-24 21:11:38
漏洞类型:
环境问题
状态:
PUBLISHED
数据质量分数:
0.30
数据版本:
v3
漏洞描述
中文描述:
Apache Tomcat是美国阿帕奇(Apache)软件基金会的一款轻量级Web应用服务器。该程序实现了对Servlet和JavaServer Page(JSP)的支持。 Apache Tomcat 9.0.0.M1版本至9.0.30版本、8.5.0版本至8.5.50版本和7.0.0版本至7.0.99版本中存在环境问题漏洞。该漏洞源于网络系统或产品的环境因素不合理。
英文描述:
In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.
CWE类型:
CWE-444
标签:
(暂无数据)
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Apache | Apache Tomcat | Apache Tomcat 9.0.0.M1 to 9.0.30 | - | - |
cpe:2.3:a:apache:apache_tomcat:apache_tomcat_9.0.0.m1_to_9.0.30:*:*:*:*:*:*:*
|
| Apache | Apache Tomcat | 8.5.0 to 8.5.50 | - | - |
cpe:2.3:a:apache:apache_tomcat:8.5.0_to_8.5.50:*:*:*:*:*:*:*
|
| Apache | Apache Tomcat | 7.0.0 to 7.0.99 | - | - |
cpe:2.3:a:apache:apache_tomcat:7.0.0_to_7.0.99:*:*:*:*:*:*:*
|
| apache | tomcat | * | - | - |
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
|
| apache | tomcat | 9.0.0 | - | - |
cpe:2.3:a:apache:tomcat:9.0.0:-:*:*:*:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 9.0 | - | - |
cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
|
| debian | debian_linux | 10.0 | - | - |
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*
|
| opensuse | leap | 15.1 | - | - |
cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*
|
| netapp | data_availability_services | - | - | - |
cpe:2.3:a:netapp:data_availability_services:-:*:*:*:*:*:*:*
|
| netapp | oncommand_system_manager | * | - | - |
cpe:2.3:a:netapp:oncommand_system_manager:*:*:*:*:*:*:*:*
|
| oracle | agile_engineering_data_management | 6.2.1.0 | - | - |
cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*
|
| oracle | agile_product_lifecycle_management | 9.3.3 | - | - |
cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.3:*:*:*:*:*:*:*
|
| oracle | agile_product_lifecycle_management | 9.3.5 | - | - |
cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.5:*:*:*:*:*:*:*
|
| oracle | agile_product_lifecycle_management | 9.3.6 | - | - |
cpe:2.3:a:oracle:agile_product_lifecycle_management:9.3.6:*:*:*:*:*:*:*
|
| oracle | communications_element_manager | 8.1.1 | - | - |
cpe:2.3:a:oracle:communications_element_manager:8.1.1:*:*:*:*:*:*:*
|
| oracle | communications_element_manager | 8.2.0 | - | - |
cpe:2.3:a:oracle:communications_element_manager:8.2.0:*:*:*:*:*:*:*
|
| oracle | communications_element_manager | 8.2.1 | - | - |
cpe:2.3:a:oracle:communications_element_manager:8.2.1:*:*:*:*:*:*:*
|
| oracle | communications_instant_messaging_server | 10.0.1.4.0 | - | - |
cpe:2.3:a:oracle:communications_instant_messaging_server:10.0.1.4.0:*:*:*:*:*:*:*
|
| oracle | health_sciences_empirica_inspections | 1.0.1.2 | - | - |
cpe:2.3:a:oracle:health_sciences_empirica_inspections:1.0.1.2:*:*:*:*:*:*:*
|
| oracle | health_sciences_empirica_signal | 7.3.3 | - | - |
cpe:2.3:a:oracle:health_sciences_empirica_signal:7.3.3:*:*:*:*:*:*:*
|
| oracle | hospitality_guest_access | 4.2.0 | - | - |
cpe:2.3:a:oracle:hospitality_guest_access:4.2.0:*:*:*:*:*:*:*
|
| oracle | hospitality_guest_access | 4.2.1 | - | - |
cpe:2.3:a:oracle:hospitality_guest_access:4.2.1:*:*:*:*:*:*:*
|
| oracle | hyperion_infrastructure_technology | 11.1.2.4 | - | - |
cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*
|
| oracle | instantis_enterprisetrack | * | - | - |
cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*
|
| oracle | mysql_enterprise_monitor | * | - | - |
cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*
|
| oracle | retail_order_broker | 15.0 | - | - |
cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*
|
| oracle | siebel_ui_framework | * | - | - |
cpe:2.3:a:oracle:siebel_ui_framework:*:*:*:*:*:*:*:*
|
| oracle | transportation_management | 6.3.7 | - | - |
cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*
|
| oracle | workload_manager | 12.2.0.1 | - | - |
cpe:2.3:a:oracle:workload_manager:12.2.0.1:*:*:*:*:*:*:*
|
| oracle | workload_manager | 18c | - | - |
cpe:2.3:a:oracle:workload_manager:18c:*:*:*:*:*:*:*
|
| oracle | workload_manager | 19c | - | - |
cpe:2.3:a:oracle:workload_manager:19c:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
(暂无数据)
英文解决方案:
(暂无数据)
临时解决方案:
(暂无数据)
参考链接
[tomcat-announce] 20200224 [SECURITY] CVE-2020-1935 HTTP Request Smuggling
mailing-list
cve.org
访问
cve.org
[debian-lts-announce] 20200304 [SECURITY] [DLA 2133-1] tomcat7 security update
mailing-list
cve.org
访问
cve.org
openSUSE-SU-2020:0345
vendor-advisory
cve.org
访问
cve.org
[tomee-commits] 20200320 [jira] [Created] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities
mailing-list
cve.org
访问
cve.org
[tomee-commits] 20200323 [jira] [Commented] (TOMEE-2790) TomEE plus(7.0.7) is affected by CVE-2020-1935 & CVE-2019-17569 vulnerabilities
mailing-list
cve.org
访问
cve.org
DSA-4673
vendor-advisory
cve.org
访问
cve.org
DSA-4680
vendor-advisory
cve.org
访问
cve.org
[debian-lts-announce] 20200528 [SECURITY] [DLA 2209-1] tomcat8 security update
mailing-list
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_CONFIRM
cve.org
访问
cve.org
[tomcat-users] 20200724 CVE-2020-1935
mailing-list
cve.org
访问
cve.org
[tomcat-users] 20200724 Re: CVE-2020-1935
mailing-list
cve.org
访问
cve.org
[tomcat-users] 20200724 RE: CVE-2020-1935
mailing-list
cve.org
访问
cve.org
[tomcat-users] 20200726 Re: CVE-2020-1935
mailing-list
cve.org
访问
cve.org
[tomcat-users] 20200727 RE: CVE-2020-1935
mailing-list
cve.org
访问
cve.org
USN-4448-1
vendor-advisory
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
无标题
x_refsource_MISC
cve.org
访问
cve.org
[tomcat-dev] 20210428 [Bug 65272] Problems proccessing HTTP request without CR in last versions
mailing-list
cve.org
访问
cve.org
CVSS评分详情
4.8
MEDIUM
CVSS向量:
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
CVSS版本:
3.1
机密性
LOW
完整性
LOW
可用性
NONE
时间信息
发布时间:
2020-02-24 21:11:38
修改时间:
2024-08-04 06:53:59
创建时间:
2025-11-11 15:36:09
更新时间:
2025-11-11 15:55:25
利用信息
暂无可利用代码信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2020-1935 |
2025-11-11 15:20:28 | 2025-11-11 07:36:09 |
| NVD | nvd_CVE-2020-1935 |
2025-11-11 14:56:55 | 2025-11-11 07:44:35 |
| CNNVD | cnnvd_CNNVD-202002-1130 |
2025-11-11 15:10:22 | 2025-11-11 07:55:25 |
版本与语言
当前版本:
v3
主要语言:
EN
支持语言:
EN
ZH
安全公告
暂无安全公告信息
变更历史
v3
CNNVD
2025-11-11 15:55:25
vulnerability_type: 未提取 → 环境问题; cnnvd_id: 未提取 → CNNVD-202002-1130; data_sources: ['cve', 'nvd'] → ['cnnvd', 'cve', 'nvd']
查看详细变更
- vulnerability_type: 未提取 -> 环境问题
- cnnvd_id: 未提取 -> CNNVD-202002-1130
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
v2
NVD
2025-11-11 15:44:35
cvss_score: 未提取 → 4.8; cvss_vector: NOT_EXTRACTED → CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N; cvss_version: NOT_EXTRACTED → 3.1; affected_products_count: 3 → 33; data_sources: ['cve'] → ['cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 4.8
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:L/A:N
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 3 -> 33
- data_sources: ['cve'] -> ['cve', 'nvd']