{"id":"CVE-2023-45648","details":"Improper Input Validation vulnerability in Apache Tomcat.Tomcat from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially \ncrafted, invalid trailer header could cause Tomcat to treat a single \nrequest as multiple requests leading to the possibility of request \nsmuggling when behind a reverse proxy.\n\nOlder, EOL versions may also be affected.\n\n\nUsers are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.","aliases":["BIT-tomcat-2023-45648","GHSA-r6j3-px5g-cq3x"],"modified":"2026-04-16T00:04:36.221060038Z","published":"2023-10-10T19:15:09.690Z","related":["ALSA-2024:0125","ALSA-2024:0474","SUSE-SU-2023:4337-1","SUSE-SU-2023:4423-1","SUSE-SU-2024:0472-1","openSUSE-SU-2024:13382-1"],"references":[{"type":"ADVISORY","url":"https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp"},{"type":"ADVISORY","url":"http://www.openwall.com/lists/oss-security/2023/10/10/10"},{"type":"ADVISORY","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20231103-0007/"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5521"},{"type":"ADVISORY","url":"https://www.debian.org/security/2023/dsa-5522"},{"type":"ARTICLE","url":"http://www.openwall.com/lists/oss-security/2023/10/10/10"},{"type":"ARTICLE","url":"https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/tomcat","events":[{"introduced":"3c78e95e36268dfb76db1570f0cf49104fa6eabc"},{"fixed":"90a0120a60faf9a3a657b113a7e2cdda2112be91"},{"introduced":"934df02dc68e72b95a38f372017f1b89b0d13a76"},{"fixed":"5feba31fa86b38bd645bf9cc1ddee883ad7bc6a4"},{"introduced":"e37b977db6f47e4380ad67114a49e8568951c953"},{"fixed":"36d4f7d698f71cd322204a3b242a97c54860fb8c"}]}],"database_specific":{"source":"https://storage.googleapis.com/osv-test-cve-osv-conversion/osv-output/CVE-2023-45648.json"}}],"schema_version":"1.7.3","severity":[{"type":"CVSS_V3","score":"CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N"}]}