Description
The HTTP BIO connector in Apache Tomcat 7.0.x before 7.0.12 does not properly handle HTTP pipelining, which allows remote attackers to read responses intended for other clients in opportunistic circumstances by examining the application data in HTTP packets, related to "a mix-up of responses for requests from different users."
Remediation
References
http://seclists.org/fulldisclosure/2011/Apr/97
http://securityreason.com/securityalert/8188
http://svn.apache.org/viewvc?view=revision&revision=1086349
http://svn.apache.org/viewvc?view=revision&revision=1086352
http://tomcat.apache.org/security-7.html
http://www.securityfocus.com/archive/1/517363
http://www.securityfocus.com/bid/47199
http://www.securitytracker.com/id?1025303
http://www.vupen.com/english/advisories/2011/0894
https://exchange.xforce.ibmcloud.com/vulnerabilities/66676
https://issues.apache.org/bugzilla/show_bug.cgi?id=50957
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A12374
Related Vulnerabilities
CVE-2019-18212 Vulnerability in maven package org.lsp4xml:org.eclipse.lsp4xml.extensions.emmet
CVE-2019-1351 Vulnerability in npm package nodegit
CVE-2023-32979 Vulnerability in maven package org.jenkins-ci.plugins:email-ext
CVE-2023-44487 Vulnerability in maven package org.apache.tomcat:tomcat-coyote
CVE-2019-20503 Vulnerability in maven package org.webjars.npm:electron