CVE-2020-13943Sensitive Information Exposure in Software Foundation Apache Tomcat

Severity
4.3MEDIUMNVD
EPSS
9.6%
top 7.13%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedOct 12
Latest updateMar 31

Description

If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37 or 8.5.0 to 8.5.57 exceeded the agreed maximum number of concurrent streams for a connection (in violation of the HTTP/2 protocol), it was possible that a subsequent request made on that connection could contain HTTP headers - including HTTP/2 pseudo headers - from a previous request rather than the intended headers. This could lead to users seeing responses for unexpected resources.

CVSS vector

CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:NExploitability: 2.8 | Impact: 1.4

Affected Packages4 packages

NVDapache/tomcat97 versions+96
CVEListV5apache_software_foundation/apache_tomcatApache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1 to 9.0.37, 8.5.0 to 8.5.57
NVDoracle/instantis_enterprisetrack17.1, 17.2, 17.3+2

Also affects: Debian Linux 10.0, 9.0

Patches

🔴Vulnerability Details

5
OSV
tomcat9 vulnerabilities2022-03-31
GHSA
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat2022-02-09
OSV
Exposure of Sensitive Information to an Unauthorized Actor in Apache Tomcat2022-02-09
OSV
CVE-2020-13943: If an HTTP/2 client connecting to Apache Tomcat 102020-10-12
CVEList
CVE-2020-13943: If an HTTP/2 client connecting to Apache Tomcat 102020-10-12

📋Vendor Advisories

4
Ubuntu
Tomcat vulnerabilities2022-03-31
Red Hat
tomcat: Apache Tomcat HTTP/2 Request mix-up2020-10-12
Debian
CVE-2020-13943: tomcat9 - If an HTTP/2 client connecting to Apache Tomcat 10.0.0-M1 to 10.0.0-M7, 9.0.0.M1...2020
Apache
Apache tomcat: CVE-2020-13943

💬Community

1
Bugzilla
CVE-2020-13943 tomcat: Apache Tomcat HTTP/2 Request mix-up2020-10-13
CVE-2020-13943 — Sensitive Information Exposure | cvebase