CVE-2023-46589: Apache Tomcat HTTP Request Smuggling Vulnerability
Apache Tomcat, a popular open-source Java web application server, has been found to harbor a critical vulnerability that could allow attackers to execute arbitrary code on affected servers. This vulnerability, dubbed CVE-2023-46589, has been classified as “Important” by the Apache Software Foundation, indicating its potential to cause significant damage if exploited.
Understanding the Vulnerability
The vulnerability stems from an improper input validation flaw in Tomcat’s handling of HTTP trailer headers. These headers, which are typically appended to the end of an HTTP request, provide additional information about the request. In the case of Tomcat, the vulnerability allows attackers to craft malformed trailer headers that can trick the server into processing a single request as multiple requests.
This ability to manipulate request processing opens up a pathway for a technique known as HTTP request smuggling. Through request smuggling, attackers can inject unauthorized requests into a legitimate request stream, potentially bypassing security controls and executing malicious code.
Affected Versions and Mitigation
The CVE-2023-46589 vulnerability affects Apache Tomcat versions 11.0.0-M1 through 11.0.0-M10, 10.1.0-M1 through 10.1.15, 9.0.0-M1 through 9.0.82, and 8.5.0 through 8.5.95. To address this vulnerability, Apache has released updated versions for all affected branches. Users are strongly advised to upgrade to the latest versions of Apache Tomcat:
- Apache Tomcat 11.0.0-M11 onwards
- Apache Tomcat 10.1.16 onwards
- Apache Tomcat 9.0.83 onwards
- Apache Tomcat 8.5.96 onwards