{"uuid": "4c283dc6-2954-448f-b573-55d2239ba4a8", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2023-45648", "type": "seen", "source": "https://t.me/DarkWebInformer_CVEAlerts/18485", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2023-45648\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Improper Input Validation vulnerability in Apache Tomcat.Tomcat\u00a0from 11.0.0-M1 through 11.0.0-M11, from 10.1.0-M1 through 10.1.13, from 9.0.0-M1 through 9.0.81 and from 8.5.0 through 8.5.93 did not correctly parse HTTP trailer headers. A specially \ncrafted, invalid trailer header could cause Tomcat to treat a single \nrequest as multiple requests leading to the possibility of request \nsmuggling when behind a reverse proxy.\n\nUsers are recommended to upgrade to version 11.0.0-M12 onwards, 10.1.14 onwards, 9.0.81 onwards or 8.5.94 onwards, which fix the issue.\n\ud83d\udccf Published: 2023-10-10T18:38:34.097Z\n\ud83d\udccf Modified: 2025-06-16T16:59:51.137Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/2pv8yz1pyp088tsxfb7ogltk9msk0jdp\n2. http://www.openwall.com/lists/oss-security/2023/10/10/10\n3. https://www.debian.org/security/2023/dsa-5522\n4. https://www.debian.org/security/2023/dsa-5521\n5. https://lists.debian.org/debian-lts-announce/2023/10/msg00020.html\n6. https://security.netapp.com/advisory/ntap-20231103-0007/", "creation_timestamp": "2025-06-16T17:38:00.000000Z"}