{
  "threat_severity" : "Low",
  "public_date" : "2020-02-24T00:00:00Z",
  "bugzilla" : {
    "description" : "tomcat: Mishandling of Transfer-Encoding header allows for HTTP request smuggling",
    "id" : "1806835",
    "url" : "https://bugzilla.redhat.com/show_bug.cgi?id=1806835"
  },
  "cvss3" : {
    "cvss3_base_score" : "4.3",
    "cvss3_scoring_vector" : "CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:N/I:N/A:L",
    "status" : "verified"
  },
  "cwe" : "CWE-444",
  "details" : [ "In Apache Tomcat 9.0.0.M1 to 9.0.30, 8.5.0 to 8.5.50 and 7.0.0 to 7.0.99 the HTTP header parsing code used an approach to end-of-line parsing that allowed some invalid HTTP headers to be parsed as valid. This led to a possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. Such a reverse proxy is considered unlikely.", "A flaw was found in Apache Tomcat. The HTTP header parsing code used an approach to end-of-line (EOL) parsing that allowed some invalid HTTP headers to be parsed as valid. This led to the possibility of HTTP Request Smuggling if Tomcat was located behind a reverse proxy that incorrectly handled the invalid Transfer-Encoding header in a particular manner. The highest threat with this vulnerability is system availability." ],
  "statement" : "OpenDaylight in Red Hat OpenStack 10 & 13 was in technical preview status, because of this no fixes will be released for it.\nIn Red Hat Satellite 6, Candlepin is using Tomcat to provide a REST API, and has been found to be vulnerable to the flaw. However, it is currently believed that no useful attacks can be carried over.",
  "acknowledgement" : "Red Hat would like to thank @ZeddYu (Apache Tomcat Security Team) for reporting this issue.",
  "affected_release" : [ {
    "product_name" : "Red Hat Enterprise Linux 7",
    "release_date" : "2020-11-10T00:00:00Z",
    "advisory" : "RHSA-2020:5020",
    "cpe" : "cpe:/o:redhat:enterprise_linux:7",
    "package" : "tomcat-0:7.0.76-16.el7_9"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.6 Extended Update Support",
    "release_date" : "2021-03-16T00:00:00Z",
    "advisory" : "RHSA-2021:0882",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.6",
    "package" : "tomcat-0:7.0.76-11.el7_6"
  }, {
    "product_name" : "Red Hat Enterprise Linux 7.7 Extended Update Support",
    "release_date" : "2021-03-30T00:00:00Z",
    "advisory" : "RHSA-2021:1030",
    "cpe" : "cpe:/o:redhat:rhel_eus:7.7",
    "package" : "tomcat-0:7.0.76-12.el7_7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2020-11-04T00:00:00Z",
    "advisory" : "RHSA-2020:4847",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "pki-core:10.6-8030020200911215836.5ff1562f"
  }, {
    "product_name" : "Red Hat Enterprise Linux 8",
    "release_date" : "2020-11-04T00:00:00Z",
    "advisory" : "RHSA-2020:4847",
    "cpe" : "cpe:/a:redhat:enterprise_linux:8",
    "package" : "pki-deps:10.6-8030020200527165326.30b713e6"
  }, {
    "product_name" : "Red Hat Fuse 7.9",
    "release_date" : "2021-08-11T00:00:00Z",
    "advisory" : "RHSA-2021:3140",
    "cpe" : "cpe:/a:redhat:jboss_fuse:7",
    "package" : "tomcat"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3.1",
    "release_date" : "2020-08-04T00:00:00Z",
    "advisory" : "RHSA-2020:3305",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1",
    "package" : "tomcat"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2020-08-04T00:00:00Z",
    "advisory" : "RHSA-2020:3303",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
    "package" : "tomcat7-0:7.0.70-41.ep7.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 6",
    "release_date" : "2020-08-04T00:00:00Z",
    "advisory" : "RHSA-2020:3303",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el6",
    "package" : "tomcat8-0:8.0.36-45.ep7.el6"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2020-08-04T00:00:00Z",
    "advisory" : "RHSA-2020:3303",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7",
    "package" : "tomcat7-0:7.0.70-41.ep7.el7"
  }, {
    "product_name" : "Red Hat JBoss Web Server 3 for RHEL 7",
    "release_date" : "2020-08-04T00:00:00Z",
    "advisory" : "RHSA-2020:3303",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:3.1::el7",
    "package" : "tomcat8-0:8.0.36-45.ep7.el7"
  }, {
    "product_name" : "Red Hat JBoss Web Server 5.3 on RHEL 6",
    "release_date" : "2020-04-21T00:00:00Z",
    "advisory" : "RHSA-2020:1520",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6",
    "package" : "jws5-tomcat-0:9.0.30-3.redhat_4.1.el6jws"
  }, {
    "product_name" : "Red Hat JBoss Web Server 5.3 on RHEL 6",
    "release_date" : "2020-04-21T00:00:00Z",
    "advisory" : "RHSA-2020:1520",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el6",
    "package" : "jws5-tomcat-native-0:1.2.23-4.redhat_4.el6jws"
  }, {
    "product_name" : "Red Hat JBoss Web Server 5.3 on RHEL 7",
    "release_date" : "2020-04-21T00:00:00Z",
    "advisory" : "RHSA-2020:1520",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7",
    "package" : "jws5-tomcat-0:9.0.30-3.redhat_4.1.el7jws"
  }, {
    "product_name" : "Red Hat JBoss Web Server 5.3 on RHEL 7",
    "release_date" : "2020-04-21T00:00:00Z",
    "advisory" : "RHSA-2020:1520",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el7",
    "package" : "jws5-tomcat-native-0:1.2.23-4.redhat_4.el7jws"
  }, {
    "product_name" : "Red Hat JBoss Web Server 5.3 on RHEL 8",
    "release_date" : "2020-04-21T00:00:00Z",
    "advisory" : "RHSA-2020:1520",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8",
    "package" : "jws5-tomcat-0:9.0.30-3.redhat_4.1.el8jws"
  }, {
    "product_name" : "Red Hat JBoss Web Server 5.3 on RHEL 8",
    "release_date" : "2020-04-21T00:00:00Z",
    "advisory" : "RHSA-2020:1520",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:5.3::el8",
    "package" : "jws5-tomcat-native-0:1.2.23-4.redhat_4.el8jws"
  }, {
    "product_name" : "Red Hat JBoss Web Server (JWS) 5.3",
    "release_date" : "2020-04-21T00:00:00Z",
    "advisory" : "RHSA-2020:1521",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_web_server:5.3",
    "package" : "tomcat"
  }, {
    "product_name" : "Red Hat Runtimes Spring Boot 2.1.13",
    "release_date" : "2020-06-04T00:00:00Z",
    "advisory" : "RHSA-2020:2367",
    "cpe" : "cpe:/a:redhat:openshift_application_runtimes:1.0",
    "package" : "tomcat"
  } ],
  "package_state" : [ {
    "product_name" : "Red Hat Decision Manager 7",
    "fix_state" : "Not affected",
    "package_name" : "tomcat",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_brms_platform:7"
  }, {
    "product_name" : "Red Hat Enterprise Linux 5",
    "fix_state" : "Out of support scope",
    "package_name" : "tomcat5",
    "cpe" : "cpe:/o:redhat:enterprise_linux:5"
  }, {
    "product_name" : "Red Hat Enterprise Linux 6",
    "fix_state" : "Out of support scope",
    "package_name" : "tomcat6",
    "cpe" : "cpe:/o:redhat:enterprise_linux:6"
  }, {
    "product_name" : "Red Hat JBoss Enterprise Application Platform 6",
    "fix_state" : "Out of support scope",
    "package_name" : "jbossweb",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_application_platform:6"
  }, {
    "product_name" : "Red Hat JBoss Fuse 6",
    "fix_state" : "Out of support scope",
    "package_name" : "tomcat",
    "cpe" : "cpe:/a:redhat:jboss_fuse:6"
  }, {
    "product_name" : "Red Hat OpenStack Platform 10 (Newton)",
    "fix_state" : "Out of support scope",
    "package_name" : "opendaylight",
    "cpe" : "cpe:/a:redhat:openstack:10"
  }, {
    "product_name" : "Red Hat OpenStack Platform 13 (Queens)",
    "fix_state" : "Will not fix",
    "package_name" : "opendaylight",
    "cpe" : "cpe:/a:redhat:openstack:13"
  }, {
    "product_name" : "Red Hat Process Automation 7",
    "fix_state" : "Not affected",
    "package_name" : "tomcat",
    "cpe" : "cpe:/a:redhat:jboss_enterprise_bpms_platform:7"
  } ],
  "references" : [ "https://www.cve.org/CVERecord?id=CVE-2020-1935\nhttps://nvd.nist.gov/vuln/detail/CVE-2020-1935\nhttps://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.100\nhttps://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.51\nhttps://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.31" ],
  "name" : "CVE-2020-1935",
  "mitigation" : {
    "value" : "Workaround for Red Hat Satellite 6 is to add iptables rule to deny TCP requests of Tomcat that are not originating from the Satellite.\nFor other Red Hat products, either mitigation isn't available or the currently available options don't meet the Red Hat Product Security criteria comprising ease of use and deployment, applicability to widespread installation base or stability.",
    "lang" : "en:us"
  },
  "csaw" : false
}