{"vulnerability": "CVE-2024-21733", "sightings": [{"uuid": "e7cc911e-5ea3-4406-b1c7-9d68bf34602d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "published-proof-of-concept", "source": "https://t.me/GithubRedTeam/8268", "content": "GitHub\u76d1\u63a7\u6d88\u606f\u63d0\u9192\uff01\uff01\uff01 \n\n\u66f4\u65b0\u4e86\uff1aCVE-2024\n\u63cf\u8ff0\uff1a\u4e00\u4e2a\u9a8c\u8bc1\u5bf9CVE-2024-21733\nURL\uff1ahttps://github.com/LtmThink/CVE-2024-21733\n\n\u6807\u7b7e\uff1a#CVE-2024", "creation_timestamp": "2024-08-15T09:50:40.000000Z"}, {"uuid": "dfd61450-0920-4bd5-aafe-3192e983231d", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/4338", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21733\n\ud83d\udd25 CVSS Score: 5.3 (CVSS_V3)\n\ud83d\udd39 Description: Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat. This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43.\n\nUsers are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.\n\ud83d\udccf Published: 2024-01-19T12:30:18Z\n\ud83d\udccf Modified: 2025-02-13T19:33:09Z\n\ud83d\udd17 References:\n1. https://nvd.nist.gov/vuln/detail/CVE-2024-21733\n2. https://github.com/apache/tomcat/commit/86ccc43940861703c2be96a5f35384407522125a\n3. https://github.com/apache/tomcat/commit/ce4b154e7b48f66bd98858626347747cd2514311\n4. https://github.com/apache/tomcat\n5. https://lists.apache.org/thread/h9bjqdd0odj6lhs2o96qgowcc6hb0cfz\n6. https://security.netapp.com/advisory/ntap-20240216-0005\n7. https://tomcat.apache.org/security-8.html\n8. https://tomcat.apache.org/security-9.html\n9. http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html\n10. http://www.openwall.com/lists/oss-security/2024/01/19/2", "creation_timestamp": "2025-02-13T20:14:11.000000Z"}, {"uuid": "c4171966-7b87-4518-8607-ead9b69f9ea5", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "published-proof-of-concept", "source": "https://t.me/DarkWebInformer_CVEAlerts/18305", "content": "\ud83d\udd17 DarkWebInformer.com - Cyber Threat Intelligence\n\ud83d\udccc CVE ID: CVE-2024-21733\n\ud83d\udd25 CVSS Score: N/A\n\ud83d\udd39 Description: Generation of Error Message Containing Sensitive Information vulnerability in Apache Tomcat.This issue affects Apache Tomcat: from 8.5.7 through 8.5.63, from 9.0.0-M11 through 9.0.43.\n\nUsers are recommended to upgrade to version 8.5.64 onwards or 9.0.44 onwards, which contain a fix for the issue.\n\ud83d\udccf Published: 2024-01-19T10:29:04.694Z\n\ud83d\udccf Modified: 2025-06-13T16:09:44.290Z\n\ud83d\udd17 References:\n1. https://lists.apache.org/thread/h9bjqdd0odj6lhs2o96qgowcc6hb0cfz\n2. http://www.openwall.com/lists/oss-security/2024/01/19/2\n3. http://packetstormsecurity.com/files/176951/Apache-Tomcat-8.5.63-9.0.43-HTTP-Response-Smuggling.html\n4. https://security.netapp.com/advisory/ntap-20240216-0005/", "creation_timestamp": "2025-06-13T16:37:07.000000Z"}, {"uuid": "504f02d3-985f-4236-a234-253e54ac99de", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "published-proof-of-concept", "source": "https://t.me/poxek/3639", "content": "Apache Tomcat HTTP Request Smuggling (Client-Side Desync)\n\nRecently, a critical vulnerability was discovered in Apache Tomcat, which was assigned the code CVE-2024-21733\n\nhttps://hackerone.com/reports/2327341\n\nVulnerable: \nfrom 8.5.7 through 8.5.63\nfrom 9.0.0-M11 through 9.0.43\n\nPatched: 8.5.64 and 9.0.44\n\n#CVE #Tomcat", "creation_timestamp": "2024-01-31T11:44:22.000000Z"}, {"uuid": "e6262755-568c-4681-ac63-e57d9b9728a6", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "published-proof-of-concept", "source": "Telegram/R8lsatJjvHXtU-QohzYJzlL4kZw_e417TUeVW5qVXlQ2pw0", "content": "", "creation_timestamp": "2024-03-20T14:38:03.000000Z"}, {"uuid": "eedf7cdb-0edc-4119-9e6b-ba16e48d6aae", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "seen", "source": "https://t.me/ctinow/186444", "content": "https://ift.tt/5GMUI8p\nCVE-2024-21733 Apache Tomcat Vulnerability in NetApp Products", "creation_timestamp": "2024-02-16T15:31:51.000000Z"}, {"uuid": "fe630c07-f978-41f3-b8aa-9f64356b09fa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "seen", "source": "https://t.me/ctinow/185350", "content": "https://ift.tt/bKUVktm\nCVE-2024-21733 | Apache Tomcat up to 8.5.63/9.0.43 Incomplete POST Request information exposure (ID 176951)", "creation_timestamp": "2024-02-15T09:16:32.000000Z"}, {"uuid": "f86e6881-4d5b-4ce6-b649-8952c4837cde", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "seen", "source": "https://t.me/ctinow/176201", "content": "https://ift.tt/1AkLdiW\nInternet Bug Bounty: CVE-2024-21733 Apache Tomcat HTTP Request Smuggling (Client- Side Desync) (CWE: 444)", "creation_timestamp": "2024-01-30T19:32:08.000000Z"}, {"uuid": "f608e19d-e1bb-4255-a122-1bda2408beaa", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "seen", "source": "https://t.me/ctinow/170172", "content": "https://ift.tt/2NkaFRO\nCVE-2024-21733", "creation_timestamp": "2024-01-19T12:21:26.000000Z"}, {"uuid": "98972440-1c6d-4ba5-8197-6fb6301ecf7f", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "seen", "source": "https://t.me/ctinow/170270", "content": "https://ift.tt/ruMBVWs\nCVE-2024-21733", "creation_timestamp": "2024-01-19T16:46:33.000000Z"}, {"uuid": "c7c7b9c2-a065-4b52-9a0b-bad1a27e5c21", "vulnerability_lookup_origin": "1a89b78e-f703-45f3-bb86-59eb712668bd", "author": "9f56dd64-161d-43a6-b9c3-555944290a09", "vulnerability": "CVE-2024-21733", "type": "published-proof-of-concept", "source": "https://t.me/CNArsenal/2153", "content": "https://hackerone.com/reports/2327341\n\nCVE-2024-21733 Apache Tomcat HTTP Request Smuggling\n#poc #exploit", "creation_timestamp": "2024-03-20T17:52:25.000000Z"}]}