QID 356190

Date Published: 2023-09-28

QID 356190: Amazon Linux Security Advisory for tomcat : ALASTOMCAT8.5-2023-012

The refactoring present in apache tomcat 9.0.28 to 9.0.30, 8.5.48 to 8.5.50 and 7.0.98 to 7.0.99 introduced a regression.
The result of the regression was that invalid transfer-encoding headers were incorrectly processed leading to a possibility of http request smuggling if tomcat was located behind a reverse proxy that incorrectly handled the invalid transfer-encoding header in a particular manner.
Such a reverse proxy is considered unlikely. (
( CVE-2019-17569) a flaw was found in apache tomcat.
The http header parsing code used an approach to end-of-line (eol) parsing that allowed some invalid http headers to be parsed as valid.
This led to the possibility of http request smuggling if tomcat was located behind a reverse proxy that incorrectly handled the invalid transfer-encoding header in a particular manner.
The highest threat with this vulnerability is system availability. (
( CVE-2020-1935)



Note: The preceding description block is extracted directly from the security advisory. Using automation, we have attempted to clean and format it as much as possible without introducing additional issues.

Successful exploitation of this vulnerability could lead to a securitybreach or could affect integrity, availability, and confidentiality.

  • CVSS V3 rated as Critical - 9.8 severity.
  • CVSS V2 rated as High - 7.5 severity.
  • Solution
    Please refer to Amazon advisory: ALASTOMCAT8.5-2023-012 for affected packages and patching details, or update with your package manager.
    Vendor References

    CVEs related to QID 356190

    Software Advisories
    Advisory ID Software Component Link
    ALASTOMCAT8.5-2023-012 amazon linux 2 URL Logo alas.aws.amazon.com/AL2/ALASTOMCAT8.5-2023-012.html