Author: markt
Date: Mon Jul 12 13:02:22 2021
New Revision: 1891484

URL: http://svn.apache.org/viewvc?rev=1891484&view=rev
Log:
Add details of CVE-2021-30639, CVE-2021-20640 & CVE-2021-33037

Modified:
    tomcat/site/trunk/docs/security-10.html
    tomcat/site/trunk/docs/security-7.html
    tomcat/site/trunk/docs/security-8.html
    tomcat/site/trunk/docs/security-9.html
    tomcat/site/trunk/xdocs/security-10.xml
    tomcat/site/trunk/xdocs/security-7.xml
    tomcat/site/trunk/xdocs/security-8.xml
    tomcat/site/trunk/xdocs/security-9.xml

Modified: tomcat/site/trunk/docs/security-10.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-10.html?rev=1891484&r1=1891483&r2=1891484&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-10.html (original)
+++ tomcat/site/trunk/docs/security-10.html Mon Jul 12 13:02:22 2021
@@ -2,7 +2,7 @@
 <html lang="en"><head><META http-equiv="Content-Type" content="text/html; 
charset=UTF-8"><meta name="viewport" content="width=device-width, 
initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet" 
type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet" 
type="text/css"><title>Apache Tomcat&reg; - Apache Tomcat 10 
vulnerabilities</title><meta name="author" content="Apache Tomcat 
Project"></head><body><div id="wrapper"><header id="header"><div 
class="clearfix"><div class="menu-toggler pull-left" tabindex="1"><div 
class="hamburger"></div></div><a href="http://tomcat.apache.org/";><img 
class="tomcat-logo pull-left noPrint" alt="Tomcat Home" 
src="res/images/tomcat.png"></a><h1 class="pull-left">Apache 
Tomcat<sup>&reg;</sup></h1><div class="asf-logos pull-right"><a 
href="https://www.apache.org/foundation/contributing.html"; target="_blank" 
class="pull-left"><img 
src="https://www.apache.org/images/SupportApache-small.png"; class="support-asf" 
alt="Support Apache"></a><a 
 href="http://www.apache.org/"; target="_blank" class="pull-left"><img 
src="res/images/asf_logo.svg" class="asf-logo" alt="The Apache Software 
Foundation"></a></div></div></header><main id="middle"><div><div 
id="mainLeft"><div id="nav-wrapper"><form 
action="https://www.google.com/search"; method="get"><div 
class="searchbox"><input value="tomcat.apache.org" name="sitesearch" 
type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" 
required="required" name="q" id="query" 
type="search"><button>GO</button></div></form><div class="asfevents"><a 
href="https://www.apache.org/events/current-event.html";><img 
src="https://www.apache.org/events/current-event-234x60.png"; alt="Next ASF 
event"><br>
               Save the date!
             </a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a 
href="./index.html">Home</a></li><li><a 
href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven 
Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a 
href="./whichversion.html">Which version?</a></li><li><a 
href="https://tomcat.apache.org/download-10.cgi";>Tomcat 10</a></li><li><a 
href="https://tomcat.apache.org/download-90.cgi";>Tomcat 9</a></li><li><a 
href="https://tomcat.apache.org/download-80.cgi";>Tomcat 8</a></li><li><a 
href="https://tomcat.apache.org/download-migration.cgi";>Tomcat Migration Tool 
for Jakarta EE</a></li><li><a 
href="https://tomcat.apache.org/download-connectors.cgi";>Tomcat 
Connectors</a></li><li><a 
href="https://tomcat.apache.org/download-native.cgi";>Tomcat 
Native</a></li><li><a 
href="https://tomcat.apache.org/download-taglibs.cgi";>Taglibs</a></li><li><a 
href="https://archive.apache.org/dist/tomcat/";>Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a
 href="./
 tomcat-10.1-doc/index.html">Tomcat 10.1 (alpha)</a></li><li><a 
href="./tomcat-10.0-doc/index.html">Tomcat 10.0</a></li><li><a 
href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a 
href="./tomcat-8.5-doc/index.html">Tomcat 8.5</a></li><li><a 
href="./connectors-doc/">Tomcat Connectors</a></li><li><a 
href="./native-doc/">Tomcat Native</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT";>Wiki</a></li><li><a 
href="./migration.html">Migration Guide</a></li><li><a 
href="./presentations.html">Presentations</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/Bi8lBg";>Specifications</a></li></ul></div><div><h2>Problems?</h2><ul><li><a
 href="./security.html">Security Reports</a></li><li><a 
href="./findhelp.html">Find help</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ";>FAQ</a></li><li><a
 href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug 
Database</a></li><li><a href="./irc.html">IRC</a></li></ul></div><div>
 <h2>Get Involved</h2><ul><li><a 
href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source 
code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/vIPzBQ";>Translations</a></li><li><a 
href="./tools.html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a 
href="https://twitter.com/theapachetomcat";>Twitter</a></li><li><a 
href="https://www.youtube.com/c/ApacheTomcatOfficial";>YouTube</a></li><li><a 
href="https://blogs.apache.org/tomcat/";>Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a
 href="./whoweare.html">Who We Are</a></li><li><a 
href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat";>Swag</a></li><li><a
 href="./heritage.html">Heritage</a></li><li><a 
href="http://www.apache.org";>Apache Home</a></li><li><a 
href="./resources.html">Resources</a></li><li><a 
href="./contact.html">Contact</a></li><li><a 
href="./legal.html">Legal</a></li><li><a 
href="https://www.apache.org/foundation/contributing
 .html">Support Apache</a></li><li><a 
href="https://www.apache.org/foundation/sponsorship.html";>Sponsorship</a></li><li><a
 href="http://www.apache.org/foundation/thanks.html";>Thanks</a></li><li><a 
href="http://www.apache.org/licenses/";>License</a></li></ul></div></nav></div></div><div
 id="mainRight"><div id="content"><h2 style="display: none;">Content</h2><h3 
id="Table_of_Contents">Table of Contents</h3><div class="text">
-<ul><li><a href="#Apache_Tomcat_10.x_vulnerabilities">Apache Tomcat 10.x 
vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in 
Apache Tomcat 10.0.2</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in Apache Tomcat 
10.0.0-M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in 
Apache Tomcat 10.0.0-M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in Apache Tomcat 
10.0.0-M7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in 
Apache Tomcat 10.0.0-M6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in Apache Tomcat 
10.0.0-M5</a></li></ul>
+<ul><li><a href="#Apache_Tomcat_10.x_vulnerabilities">Apache Tomcat 10.x 
vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.7">Fixed in 
Apache Tomcat 10.0.7</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.6">Fixed 
in Apache Tomcat 10.0.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.5">Fixed in Apache Tomcat 
10.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.2">Fixed in Apache 
Tomcat 10.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M10">Fixed in 
Apache Tomcat 10.0.0-M10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M8">Fixed in Apache Tomcat 
10.0.0-M8</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M7">Fixed in 
Apache Tomcat 10.0.0-M7</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_10.0.0-M6">Fixed in Apache Tomcat 
10.0.0-M6</a></li><li><a href="#Fixed_in_Apache_Tomcat_10.0.0-M5">Fixed in 
Apache Tomcat 10.0.0-M5</a></li></ul>
 </div><h3 id="Apache_Tomcat_10.x_vulnerabilities">Apache Tomcat 10.x 
vulnerabilities</h3><div class="text">
     <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat 10.x. Each vulnerability is given a
@@ -39,6 +39,78 @@
        <a href="security.html">Tomcat Security Team</a>. Thank you.
     </p>
 
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.0.7"><span class="pull-right">15 
June 2021</span> Fixed in Apache Tomcat 10.0.7</h3><div class="text">
+
+    <p><strong>Important: Request Smuggling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33037"; 
rel="nofollow">CVE-2021-33037</a></p>
+
+    <p>Apache Tomcat did not correctly parse the HTTP transfer-encoding request
+       header in some circumstances leading to the possibility of request
+       smuggling when used with a reverse proxy. Specifically: Tomcat
+       incorrectly ignored the transfer-encoding header if the client declared
+       it would only accept an HTTP/1.0 response; Tomcat honoured the identify
+       encoding; and Tomcat did not ensure that, if present, the chunked
+       encoding was the final encoding.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/eee0d024c1b3171560c92eaba79dd6eb8eb11bcd";>eee0d024</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/506134f957a4be2c5b4a9334f7b3435fc954dbc1";>506134f9</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/19d11556d0db99df291df33605f137976d152475";>19d11556</a>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security team by Bahruz
+       Jabiyev, Steven Sprecher and Kaan Onarlioglu of NEU seclab on 7 May 
2021.
+       The issue was made public on 12 July 2021.</p>
+
+    <p>Affects: 10.0.0-M1 to 10.0.6</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.0.6"><span class="pull-right">12 May 
2021</span> Fixed in Apache Tomcat 10.0.6</h3><div class="text">
+
+      <p><strong>Low: Authentication weakness</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30640"; 
rel="nofollow">CVE-2021-30640</a></p>
+
+    <p>Queries made by the JNDI Realm did not always correctly escape
+       parameters. Parameter values could be sourced from user provided data 
(eg
+       user names) as well as configuration data provided by an administrator.
+       In limited circumstances it was possible for users to authenticate using
+       variations of their user name and/or to bypass some of the protection
+       provided by the LockOut Realm.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/f4d9bdef53ec009b7717620d890465fa273721a6";>f4d9bdef</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/4e61e1d625a4a64d6b775e3a03c77a0b100d56d7";>4e61e1d6</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/d5303a506c7533803d2b3bc46e6120ce673a6667";>d5303a50</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/b930d0b3161d9ec78d5fa57f886ed2de4680518b";>b930d0b3</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/17208c645d68d2af1444ee8c64f36a9b8f0ba76f";>17208c64</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/bd4d1fbe9146dff4714130594afd668406a6a5ef";>bd4d1fbe</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/81f16b0a7186ed02efbfac336589d6cff28d1e89";>81f16b0a</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/eeb7351219bd8803c0053e1e80444664a7cf5b51";>eeb73512</a>.</p>
+
+    <p>This issue was reported publicly as <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=65224";>65224</a>.</p>
+
+    <p>Affects: 10.0.0-M1 to 10.0.5</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_10.0.5"><span class="pull-right">6 
April 2021</span> Fixed in Apache Tomcat 10.0.5</h3><div class="text">
+
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30639"; 
rel="nofollow">CVE-2021-30639</a></p>
+
+    <p>An error introduced as part of a change to improve error handling during
+       non-blocking I/O meant that the error flag associated with the Request
+       object was not reset between requests. This meant that once a
+       non-blocking I/O error occurred, all future requests handled by that
+       request object would fail. Users were able to trigger non-blocking I/O
+       errors, e.g. by dropping a connection, thereby creating the possibility
+       of triggering a DoS.</p>
+    <o>Applications that do not use non-blocking I/O are not exposed to this
+       vulnerability.</o>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/b59099e4ca501a039510334ebe1024971cd6f959";>b59099e4</a>.</p>
+
+    <p>This issue was reported publicly as <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=65203";>65203</a>.</p>
+
+    <p>Affects: 10.0.3 to 10.0.4</p>
+    
   </div><h3 id="Fixed_in_Apache_Tomcat_10.0.2"><span class="pull-right">2 
February 2021</span> Fixed in Apache Tomcat 10.0.2</h3><div class="text">
 
     <p><i>Note: The issues below were fixed in Apache Tomcat 10.0.1 but the

Modified: tomcat/site/trunk/docs/security-7.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-7.html?rev=1891484&r1=1891483&r2=1891484&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-7.html (original)
+++ tomcat/site/trunk/docs/security-7.html Mon Jul 12 13:02:22 2021
@@ -2,7 +2,7 @@
 <html lang="en"><head><META http-equiv="Content-Type" content="text/html; 
charset=UTF-8"><meta name="viewport" content="width=device-width, 
initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet" 
type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet" 
type="text/css"><title>Apache Tomcat&reg; - Apache Tomcat 7 
vulnerabilities</title><meta name="author" content="Apache Tomcat 
Project"></head><body><div id="wrapper"><header id="header"><div 
class="clearfix"><div class="menu-toggler pull-left" tabindex="1"><div 
class="hamburger"></div></div><a href="http://tomcat.apache.org/";><img 
class="tomcat-logo pull-left noPrint" alt="Tomcat Home" 
src="res/images/tomcat.png"></a><h1 class="pull-left">Apache 
Tomcat<sup>&reg;</sup></h1><div class="asf-logos pull-right"><a 
href="https://www.apache.org/foundation/contributing.html"; target="_blank" 
class="pull-left"><img 
src="https://www.apache.org/images/SupportApache-small.png"; class="support-asf" 
alt="Support Apache"></a><a h
 ref="http://www.apache.org/"; target="_blank" class="pull-left"><img 
src="res/images/asf_logo.svg" class="asf-logo" alt="The Apache Software 
Foundation"></a></div></div></header><main id="middle"><div><div 
id="mainLeft"><div id="nav-wrapper"><form 
action="https://www.google.com/search"; method="get"><div 
class="searchbox"><input value="tomcat.apache.org" name="sitesearch" 
type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" 
required="required" name="q" id="query" 
type="search"><button>GO</button></div></form><div class="asfevents"><a 
href="https://www.apache.org/events/current-event.html";><img 
src="https://www.apache.org/events/current-event-234x60.png"; alt="Next ASF 
event"><br>
               Save the date!
             </a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a 
href="./index.html">Home</a></li><li><a 
href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven 
Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a 
href="./whichversion.html">Which version?</a></li><li><a 
href="https://tomcat.apache.org/download-10.cgi";>Tomcat 10</a></li><li><a 
href="https://tomcat.apache.org/download-90.cgi";>Tomcat 9</a></li><li><a 
href="https://tomcat.apache.org/download-80.cgi";>Tomcat 8</a></li><li><a 
href="https://tomcat.apache.org/download-migration.cgi";>Tomcat Migration Tool 
for Jakarta EE</a></li><li><a 
href="https://tomcat.apache.org/download-connectors.cgi";>Tomcat 
Connectors</a></li><li><a 
href="https://tomcat.apache.org/download-native.cgi";>Tomcat 
Native</a></li><li><a 
href="https://tomcat.apache.org/download-taglibs.cgi";>Taglibs</a></li><li><a 
href="https://archive.apache.org/dist/tomcat/";>Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a
 href="./
 tomcat-10.1-doc/index.html">Tomcat 10.1 (alpha)</a></li><li><a 
href="./tomcat-10.0-doc/index.html">Tomcat 10.0</a></li><li><a 
href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a 
href="./tomcat-8.5-doc/index.html">Tomcat 8.5</a></li><li><a 
href="./connectors-doc/">Tomcat Connectors</a></li><li><a 
href="./native-doc/">Tomcat Native</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT";>Wiki</a></li><li><a 
href="./migration.html">Migration Guide</a></li><li><a 
href="./presentations.html">Presentations</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/Bi8lBg";>Specifications</a></li></ul></div><div><h2>Problems?</h2><ul><li><a
 href="./security.html">Security Reports</a></li><li><a 
href="./findhelp.html">Find help</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ";>FAQ</a></li><li><a
 href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug 
Database</a></li><li><a href="./irc.html">IRC</a></li></ul></div><div>
 <h2>Get Involved</h2><ul><li><a 
href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source 
code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/vIPzBQ";>Translations</a></li><li><a 
href="./tools.html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a 
href="https://twitter.com/theapachetomcat";>Twitter</a></li><li><a 
href="https://www.youtube.com/c/ApacheTomcatOfficial";>YouTube</a></li><li><a 
href="https://blogs.apache.org/tomcat/";>Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a
 href="./whoweare.html">Who We Are</a></li><li><a 
href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat";>Swag</a></li><li><a
 href="./heritage.html">Heritage</a></li><li><a 
href="http://www.apache.org";>Apache Home</a></li><li><a 
href="./resources.html">Resources</a></li><li><a 
href="./contact.html">Contact</a></li><li><a 
href="./legal.html">Legal</a></li><li><a 
href="https://www.apache.org/foundation/contributing
 .html">Support Apache</a></li><li><a 
href="https://www.apache.org/foundation/sponsorship.html";>Sponsorship</a></li><li><a
 href="http://www.apache.org/foundation/thanks.html";>Thanks</a></li><li><a 
href="http://www.apache.org/licenses/";>License</a></li></ul></div></nav></div></div><div
 id="mainRight"><div id="content"><h2 style="display: none;">Content</h2><h3 
id="Table_of_Contents">Table of Contents</h3><div class="text">
-<ul><li><a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x 
vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.108">Fixed in 
Apache Tomcat 7.0.108</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.107">Fixed in Apache Tomcat 
7.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.105">Fixed in Apache 
Tomcat 7.0.105</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.104">Fixed in 
Apache Tomcat 7.0.104</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.100">Fixed in Apache Tomcat 
7.0.100</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.99">Fixed in Apache 
Tomcat 7.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.94">Fixed in 
Apache Tomcat 7.0.94</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.91">Fixed 
in Apache Tomcat 7.0.91</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.90">Fixed in Apache Tomcat 
7.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.89">Fixed in Apache 
Tomcat 7.0.89</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.88">Fixed in 
Apache T
 omcat 7.0.88</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.85">Fixed in 
Apache Tomcat 7.0.85</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.84">Fixed 
in Apache Tomcat 7.0.84</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.82">Fixed in Apache Tomcat 
7.0.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.81">Fixed in Apache 
Tomcat 7.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.79">Fixed in 
Apache Tomcat 7.0.79</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.78">Fixed 
in Apache Tomcat 7.0.78</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.77">Fixed in Apache Tomcat 
7.0.77</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.76">Fixed in Apache 
Tomcat 7.0.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.75">Fixed in 
Apache Tomcat 7.0.75</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.73">Fixed 
in Apache Tomcat 7.0.73</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.72">Fixed in Apache Tomcat 
7.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.70">Fixed in Apache To
 mcat 7.0.70</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.68">Fixed in 
Apache Tomcat 7.0.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.67">Fixed 
in Apache Tomcat 7.0.67</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.65">Fixed in Apache Tomcat 
7.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.59">Fixed in Apache 
Tomcat 7.0.59</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.55">Fixed in 
Apache Tomcat 7.0.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.54">Fixed 
in Apache Tomcat 7.0.54</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.53">Fixed in Apache Tomcat 
7.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.52">Fixed in Apache 
Tomcat 7.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.50">Fixed in 
Apache Tomcat 7.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.47">Fixed 
in Apache Tomcat 7.0.47</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.40">Fixed in Apache Tomcat 
7.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.33">Fixed in Apache Tom
 cat 7.0.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.32">Fixed in 
Apache Tomcat 7.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.30">Fixed 
in Apache Tomcat 7.0.30</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.28">Fixed in Apache Tomcat 
7.0.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.23">Fixed in Apache 
Tomcat 7.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.22">Fixed in 
Apache Tomcat 7.0.22</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.21">Fixed 
in Apache Tomcat 7.0.21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.20">Fixed in Apache Tomcat 
7.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.19">Fixed in Apache 
Tomcat 7.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.14">Fixed in 
Apache Tomcat 7.0.14</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.12">Fixed 
in Apache Tomcat 7.0.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.11">Fixed in Apache Tomcat 
7.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.8">Fixed in Apache Tomca
 t 7.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.6">Fixed in Apache 
Tomcat 7.0.6</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.5">Fixed in 
Apache Tomcat 7.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.4">Fixed 
in Apache Tomcat 7.0.4</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.2">Fixed in Apache Tomcat 
7.0.2</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a vulnerability 
in Tomcat</a></li></ul>
+<ul><li><a href="#Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x 
vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.109">Fixed in 
Apache Tomcat 7.0.109</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.108">Fixed in Apache Tomcat 
7.0.108</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.107">Fixed in Apache 
Tomcat 7.0.107</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.105">Fixed in 
Apache Tomcat 7.0.105</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.104">Fixed in Apache Tomcat 
7.0.104</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.100">Fixed in Apache 
Tomcat 7.0.100</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.99">Fixed in 
Apache Tomcat 7.0.99</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.94">Fixed 
in Apache Tomcat 7.0.94</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.91">Fixed in Apache Tomcat 
7.0.91</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.90">Fixed in Apache 
Tomcat 7.0.90</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.89">Fixed in 
Apache
  Tomcat 7.0.89</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.88">Fixed in 
Apache Tomcat 7.0.88</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.85">Fixed 
in Apache Tomcat 7.0.85</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.84">Fixed in Apache Tomcat 
7.0.84</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.82">Fixed in Apache 
Tomcat 7.0.82</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.81">Fixed in 
Apache Tomcat 7.0.81</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.79">Fixed 
in Apache Tomcat 7.0.79</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.78">Fixed in Apache Tomcat 
7.0.78</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.77">Fixed in Apache 
Tomcat 7.0.77</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.76">Fixed in 
Apache Tomcat 7.0.76</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.75">Fixed 
in Apache Tomcat 7.0.75</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.73">Fixed in Apache Tomcat 
7.0.73</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.72">Fixed in Apache 
 Tomcat 7.0.72</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.70">Fixed in 
Apache Tomcat 7.0.70</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.68">Fixed 
in Apache Tomcat 7.0.68</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.67">Fixed in Apache Tomcat 
7.0.67</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.65">Fixed in Apache 
Tomcat 7.0.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.59">Fixed in 
Apache Tomcat 7.0.59</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.55">Fixed 
in Apache Tomcat 7.0.55</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.54">Fixed in Apache Tomcat 
7.0.54</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.53">Fixed in Apache 
Tomcat 7.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.52">Fixed in 
Apache Tomcat 7.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.50">Fixed 
in Apache Tomcat 7.0.50</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.47">Fixed in Apache Tomcat 
7.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.40">Fixed in Apache T
 omcat 7.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.33">Fixed in 
Apache Tomcat 7.0.33</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.32">Fixed 
in Apache Tomcat 7.0.32</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.30">Fixed in Apache Tomcat 
7.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.28">Fixed in Apache 
Tomcat 7.0.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.23">Fixed in 
Apache Tomcat 7.0.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.22">Fixed 
in Apache Tomcat 7.0.22</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.21">Fixed in Apache Tomcat 
7.0.21</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.20">Fixed in Apache 
Tomcat 7.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.19">Fixed in 
Apache Tomcat 7.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.14">Fixed 
in Apache Tomcat 7.0.14</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.12">Fixed in Apache Tomcat 
7.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.11">Fixed in Apache To
 mcat 7.0.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.8">Fixed in 
Apache Tomcat 7.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.6">Fixed 
in Apache Tomcat 7.0.6</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_7.0.5">Fixed in Apache Tomcat 
7.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.4">Fixed in Apache 
Tomcat 7.0.4</a></li><li><a href="#Fixed_in_Apache_Tomcat_7.0.2">Fixed in 
Apache Tomcat 7.0.2</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
 </div><h3 id="Apache_Tomcat_7.x_vulnerabilities">Apache Tomcat 7.x 
vulnerabilities</h3><div class="text">
     <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat 7.x. Each vulnerability is given a
@@ -39,6 +39,25 @@
        <a href="security.html">Tomcat Security Team</a>. Thank you.
     </p>
 
+  </div><h3 id="Fixed_in_Apache_Tomcat_7.0.109"><span class="pull-right">26 
April 2021</span> Fixed in Apache Tomcat 7.0.109</h3><div class="text">
+
+      <p><strong>Low: Authentication weakness</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30640"; 
rel="nofollow">CVE-2021-30640</a></p>
+
+    <p>Queries made by the JNDI Realm did not always correctly escape
+       parameters. Parameter values could be sourced from user provided data 
(eg
+       user names) as well as configuration data provided by an administrator.
+       In limited circumstances it was possible for users to authenticate using
+       variations of their user name and/or to bypass some of the protection
+       provided by the LockOut Realm.</p>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/e21eb4764ccda55e5a35a5a7c19a6fd2b0757fe9";>e21eb476</a>.</p>
+
+    <p>This issue was reported publicly as <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=65224";>65224</a>.</p>
+
+    <p>Affects: 7.0.0 to 7.0.108</p>
+
   </div><h3 id="Fixed_in_Apache_Tomcat_7.0.108"><span class="pull-right">5 
February 2021</span> Fixed in Apache Tomcat 7.0.108</h3><div class="text">
 
     <p><strong>Low: Fix for <a 
href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2020-9484"; 
rel="nofollow">CVE-2020-9484</a> was incomplete</strong>

Modified: tomcat/site/trunk/docs/security-8.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-8.html?rev=1891484&r1=1891483&r2=1891484&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-8.html (original)
+++ tomcat/site/trunk/docs/security-8.html Mon Jul 12 13:02:22 2021
@@ -2,7 +2,7 @@
 <html lang="en"><head><META http-equiv="Content-Type" content="text/html; 
charset=UTF-8"><meta name="viewport" content="width=device-width, 
initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet" 
type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet" 
type="text/css"><title>Apache Tomcat&reg; - Apache Tomcat 8 
vulnerabilities</title><meta name="author" content="Apache Tomcat 
Project"></head><body><div id="wrapper"><header id="header"><div 
class="clearfix"><div class="menu-toggler pull-left" tabindex="1"><div 
class="hamburger"></div></div><a href="http://tomcat.apache.org/";><img 
class="tomcat-logo pull-left noPrint" alt="Tomcat Home" 
src="res/images/tomcat.png"></a><h1 class="pull-left">Apache 
Tomcat<sup>&reg;</sup></h1><div class="asf-logos pull-right"><a 
href="https://www.apache.org/foundation/contributing.html"; target="_blank" 
class="pull-left"><img 
src="https://www.apache.org/images/SupportApache-small.png"; class="support-asf" 
alt="Support Apache"></a><a h
 ref="http://www.apache.org/"; target="_blank" class="pull-left"><img 
src="res/images/asf_logo.svg" class="asf-logo" alt="The Apache Software 
Foundation"></a></div></div></header><main id="middle"><div><div 
id="mainLeft"><div id="nav-wrapper"><form 
action="https://www.google.com/search"; method="get"><div 
class="searchbox"><input value="tomcat.apache.org" name="sitesearch" 
type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" 
required="required" name="q" id="query" 
type="search"><button>GO</button></div></form><div class="asfevents"><a 
href="https://www.apache.org/events/current-event.html";><img 
src="https://www.apache.org/events/current-event-234x60.png"; alt="Next ASF 
event"><br>
               Save the date!
             </a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a 
href="./index.html">Home</a></li><li><a 
href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven 
Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a 
href="./whichversion.html">Which version?</a></li><li><a 
href="https://tomcat.apache.org/download-10.cgi";>Tomcat 10</a></li><li><a 
href="https://tomcat.apache.org/download-90.cgi";>Tomcat 9</a></li><li><a 
href="https://tomcat.apache.org/download-80.cgi";>Tomcat 8</a></li><li><a 
href="https://tomcat.apache.org/download-migration.cgi";>Tomcat Migration Tool 
for Jakarta EE</a></li><li><a 
href="https://tomcat.apache.org/download-connectors.cgi";>Tomcat 
Connectors</a></li><li><a 
href="https://tomcat.apache.org/download-native.cgi";>Tomcat 
Native</a></li><li><a 
href="https://tomcat.apache.org/download-taglibs.cgi";>Taglibs</a></li><li><a 
href="https://archive.apache.org/dist/tomcat/";>Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a
 href="./
 tomcat-10.1-doc/index.html">Tomcat 10.1 (alpha)</a></li><li><a 
href="./tomcat-10.0-doc/index.html">Tomcat 10.0</a></li><li><a 
href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a 
href="./tomcat-8.5-doc/index.html">Tomcat 8.5</a></li><li><a 
href="./connectors-doc/">Tomcat Connectors</a></li><li><a 
href="./native-doc/">Tomcat Native</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT";>Wiki</a></li><li><a 
href="./migration.html">Migration Guide</a></li><li><a 
href="./presentations.html">Presentations</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/Bi8lBg";>Specifications</a></li></ul></div><div><h2>Problems?</h2><ul><li><a
 href="./security.html">Security Reports</a></li><li><a 
href="./findhelp.html">Find help</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ";>FAQ</a></li><li><a
 href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug 
Database</a></li><li><a href="./irc.html">IRC</a></li></ul></div><div>
 <h2>Get Involved</h2><ul><li><a 
href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source 
code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/vIPzBQ";>Translations</a></li><li><a 
href="./tools.html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a 
href="https://twitter.com/theapachetomcat";>Twitter</a></li><li><a 
href="https://www.youtube.com/c/ApacheTomcatOfficial";>YouTube</a></li><li><a 
href="https://blogs.apache.org/tomcat/";>Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a
 href="./whoweare.html">Who We Are</a></li><li><a 
href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat";>Swag</a></li><li><a
 href="./heritage.html">Heritage</a></li><li><a 
href="http://www.apache.org";>Apache Home</a></li><li><a 
href="./resources.html">Resources</a></li><li><a 
href="./contact.html">Contact</a></li><li><a 
href="./legal.html">Legal</a></li><li><a 
href="https://www.apache.org/foundation/contributing
 .html">Support Apache</a></li><li><a 
href="https://www.apache.org/foundation/sponsorship.html";>Sponsorship</a></li><li><a
 href="http://www.apache.org/foundation/thanks.html";>Thanks</a></li><li><a 
href="http://www.apache.org/licenses/";>License</a></li></ul></div></nav></div></div><div
 id="mainRight"><div id="content"><h2 style="display: none;">Content</h2><h3 
id="Table_of_Contents">Table of Contents</h3><div class="text">
-<ul><li><a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in 
Apache Tomcat 8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed 
in Apache Tomcat 8.5.60</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed in Apache Tomcat 
8.5.58</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in Apache 
Tomcat 8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in 
Apache Tomcat 8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed 
in Apache Tomcat 8.5.55</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed in Apache Tomcat 
8.5.51</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache 
Tomcat 8.5.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in 
Apache Tomcat 8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed 
in Apache Tomcat 8.5.41</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in Apache Tomcat 8.5.
 40</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed in Apache Tomcat 
8.5.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in Apache 
Tomcat 8.5.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in 
Apache Tomcat 8.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed 
in Apache Tomcat 8.5.32</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed in Apache Tomcat 
8.0.52</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in Apache 
Tomcat 8.5.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in 
Apache Tomcat 8.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed 
in Apache Tomcat 8.5.28</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed in Apache Tomcat 
8.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in Apache 
Tomcat 8.5.24</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in 
Apache Tomcat 8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed 
in Apache Tomcat 8.5.2
 3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed in Apache Tomcat 
8.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache 
Tomcat 8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in 
Apache Tomcat 8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed 
in Apache Tomcat 8.5.15</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed in Apache Tomcat 
8.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache 
Tomcat 8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in 
Apache Tomcat 8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed 
in Apache Tomcat 8.5.12</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed in Apache Tomcat 
8.0.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache 
Tomcat 8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in 
Apache Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed 
in Apache Tomcat 8.0.39</
 a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed in Apache Tomcat 
8.5.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in 
Apache Tomcat 8.5.5 and 8.0.37</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed in Apache Tomcat 8.5.3 
and 8.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache 
Tomcat 8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in 
Apache Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed 
in Apache Tomcat 8.0.27</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed in Apache Tomcat 
8.0.17</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache 
Tomcat 8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.8">Fixed in 
Apache Tomcat 8.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed 
in Apache Tomcat 8.0.5</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache Tomcat 
8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10
 ">Fixed in Apache Tomcat 8.0.0-RC10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in Apache Tomcat 
8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
+<ul><li><a href="#Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.68">Fixed in 
Apache Tomcat 8.5.68</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.66">Fixed 
in Apache Tomcat 8.5.66</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.65">Fixed in Apache Tomcat 
8.5.65</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.63">Fixed in Apache 
Tomcat 8.5.63</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.60">Fixed in 
Apache Tomcat 8.5.60</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.58">Fixed 
in Apache Tomcat 8.5.58</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.57">Fixed in Apache Tomcat 
8.5.57</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.56">Fixed in Apache 
Tomcat 8.5.56</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.55">Fixed in 
Apache Tomcat 8.5.55</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.51">Fixed 
in Apache Tomcat 8.5.51</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.50">Fixed in Apache Tomcat 8.5.
 50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.49">Fixed in Apache Tomcat 
8.5.49</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.41">Fixed in Apache 
Tomcat 8.5.41</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.40">Fixed in 
Apache Tomcat 8.5.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.38">Fixed 
in Apache Tomcat 8.5.38</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.34">Fixed in Apache Tomcat 
8.5.34</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.53">Fixed in Apache 
Tomcat 8.0.53</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.32">Fixed in 
Apache Tomcat 8.5.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.52">Fixed 
in Apache Tomcat 8.0.52</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.31">Fixed in Apache Tomcat 
8.5.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.50">Fixed in Apache 
Tomcat 8.0.50</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.28">Fixed in 
Apache Tomcat 8.5.28</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.48">Fixed 
in Apache Tomcat 8.0.4
 8</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.24">Fixed in Apache Tomcat 
8.5.24</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.47">Fixed in Apache 
Tomcat 8.0.47</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.23">Fixed in 
Apache Tomcat 8.5.23</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.45">Fixed 
in Apache Tomcat 8.0.45</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.16">Fixed in Apache Tomcat 
8.5.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.44">Fixed in Apache 
Tomcat 8.0.44</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.15">Fixed in 
Apache Tomcat 8.5.15</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.43">Fixed 
in Apache Tomcat 8.0.43</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.13">Fixed in Apache Tomcat 
8.5.13</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.42">Fixed in Apache 
Tomcat 8.0.42</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.12">Fixed in 
Apache Tomcat 8.5.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.41">Fixed 
in Apache Tomcat 8.0.41
 </a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.11">Fixed in Apache Tomcat 
8.5.11</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.9">Fixed in Apache 
Tomcat 8.5.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.39">Fixed in 
Apache Tomcat 8.0.39</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.8">Fixed 
in Apache Tomcat 8.5.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37">Fixed in Apache Tomcat 8.5.5 
and 8.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36">Fixed 
in Apache Tomcat 8.5.3 and 8.0.36</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.32">Fixed in Apache Tomcat 
8.0.32</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.30">Fixed in Apache 
Tomcat 8.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.27">Fixed in 
Apache Tomcat 8.0.27</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.17">Fixed 
in Apache Tomcat 8.0.17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.9">Fixed in Apache Tomcat 
8.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.
 8">Fixed in Apache Tomcat 8.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.5">Fixed in Apache Tomcat 
8.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.3">Fixed in Apache 
Tomcat 8.0.3</a></li><li><a href="#Fixed_in_Apache_Tomcat_8.0.0-RC10">Fixed in 
Apache Tomcat 8.0.0-RC10</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_8.0.0-RC3">Fixed in Apache Tomcat 
8.0.0-RC3</a></li><li><a href="#Not_a_vulnerability_in_Tomcat">Not a 
vulnerability in Tomcat</a></li></ul>
 </div><h3 id="Apache_Tomcat_8.x_vulnerabilities">Apache Tomcat 8.x 
vulnerabilities</h3><div class="text">
     <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat 8.x. Each vulnerability is given a
@@ -44,6 +44,86 @@
        <a href="security.html">Tomcat Security Team</a>. Thank you.
     </p>
 
+  </div><h3 id="Fixed_in_Apache_Tomcat_8.5.68"><span class="pull-right">15 
June 2021</span> Fixed in Apache Tomcat 8.5.68</h3><div class="text">
+
+    <p><i>Note: The issue below was fixed in Apache Tomcat 8.5.67 but the
+       release vote for the 8.5.67 release candidate did not pass. Therefore,
+       although users must download 8.5.68 to obtain a version that includes a
+       fix for this issue, version 8.5.67 is not included in the list of 
+       affected versions.</i></p>
+
+    <p><strong>Important: Request Smuggling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33037"; 
rel="nofollow">CVE-2021-33037</a></p>
+
+    <p>Apache Tomcat did not correctly parse the HTTP transfer-encoding request
+       header in some circumstances leading to the possibility of request
+       smuggling when used with a reverse proxy. Specifically: Tomcat
+       incorrectly ignored the transfer-encoding header if the client declared
+       it would only accept an HTTP/1.0 response; Tomcat honoured the identify
+       encoding; and Tomcat did not ensure that, if present, the chunked
+       encoding was the final encoding.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/3202703e6d635e39b74262e81f0cb4bcbe2170dc";>3202703e</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/da0e7cb093cf68b052d9175e469dbd0464441b0b";>da0e7cb0</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/8874fa02e9b36baa9ca6b226c0882c0190ca5a02";>8874fa02</a>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security team by Bahruz
+       Jabiyev, Steven Sprecher and Kaan Onarlioglu of NEU seclab on 7 May 
2021.
+       The issue was made public on 12 July 2021.</p>
+
+    <p>This issue was identified and reported responsibly .</p>
+
+    <p>Affects: 8.5.0 to 8.5.66</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_8.5.66"><span class="pull-right">12 May 
2021</span> Fixed in Apache Tomcat 8.5.66</h3><div class="text">
+
+      <p><strong>Low: Authentication weakness</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30640"; 
rel="nofollow">CVE-2021-30640</a></p>
+
+    <p>Queries made by the JNDI Realm did not always correctly escape
+       parameters. Parameter values could be sourced from user provided data 
(eg
+       user names) as well as configuration data provided by an administrator.
+       In limited circumstances it was possible for users to authenticate using
+       variations of their user name and/or to bypass some of the protection
+       provided by the LockOut Realm.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/24dfb30076997b640e5123e92c4b8d7f206f609c";>24dfb300</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/0a272b00aed57526dbfc8b881ab253c23c61f100";>0a272b00</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/c9f21a2a7908c7c4ecd4f9bb495d3ee36a2bd822";>c9f21a2a</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/4e86b4ea0d1a9b00fa93971c31b93ad1bd49c7fe";>4e86b4ea</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/79580e7f70a07c083be07307376511bb864d5a7b";>79580e7f</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/d3407672774e372fae8b5898d55f85d16f22b972";>d3407672</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/6a9129ac9bd06555ce04bb564a76fc3987311f38";>6a9129ac</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/ad22db641dcd61c2e8078f658fa709897b5da375";>ad22db64</a>.</p>
+
+    <p>This issue was reported publicly as <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=65224";>65224</a>.</p>
+
+    <p>Affects: 8.5.0 to 8.5.65</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_8.5.65"><span class="pull-right">6 
April 2021</span> Fixed in Apache Tomcat 8.5.65</h3><div class="text">
+
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30639"; 
rel="nofollow">CVE-2021-30639</a></p>
+
+    <p>An error introduced as part of a change to improve error handling during
+       non-blocking I/O meant that the error flag associated with the Request
+       object was not reset between requests. This meant that once a
+       non-blocking I/O error occurred, all future requests handled by that
+       request object would fail. Users were able to trigger non-blocking I/O
+       errors, e.g. by dropping a connection, thereby creating the possibility
+       of triggering a DoS.</p>
+    <o>Applications that do not use non-blocking I/O are not exposed to this
+       vulnerability.</o>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/411caf29ac1c16e6ac291b6e5543b2371dbd25e2";>411caf29</a>.</p>
+
+    <p>This issue was reported publicly as <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=65203";>65203</a>.</p>
+
+    <p>Affects: 8.5.64</p>
+    
   </div><h3 id="Fixed_in_Apache_Tomcat_8.5.63"><span class="pull-right">2 
February 2021</span> Fixed in Apache Tomcat 8.5.63</h3><div class="text">
 
     <p><i>Note: The issues below were fixed in Apache Tomcat 8.5.62 but the

Modified: tomcat/site/trunk/docs/security-9.html
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/docs/security-9.html?rev=1891484&r1=1891483&r2=1891484&view=diff
==============================================================================
--- tomcat/site/trunk/docs/security-9.html (original)
+++ tomcat/site/trunk/docs/security-9.html Mon Jul 12 13:02:22 2021
@@ -2,7 +2,7 @@
 <html lang="en"><head><META http-equiv="Content-Type" content="text/html; 
charset=UTF-8"><meta name="viewport" content="width=device-width, 
initial-scale=1"><link href="res/css/tomcat.css" rel="stylesheet" 
type="text/css"><link href="res/css/fonts/fonts.css" rel="stylesheet" 
type="text/css"><title>Apache Tomcat&reg; - Apache Tomcat 9 
vulnerabilities</title><meta name="author" content="Apache Tomcat 
Project"></head><body><div id="wrapper"><header id="header"><div 
class="clearfix"><div class="menu-toggler pull-left" tabindex="1"><div 
class="hamburger"></div></div><a href="http://tomcat.apache.org/";><img 
class="tomcat-logo pull-left noPrint" alt="Tomcat Home" 
src="res/images/tomcat.png"></a><h1 class="pull-left">Apache 
Tomcat<sup>&reg;</sup></h1><div class="asf-logos pull-right"><a 
href="https://www.apache.org/foundation/contributing.html"; target="_blank" 
class="pull-left"><img 
src="https://www.apache.org/images/SupportApache-small.png"; class="support-asf" 
alt="Support Apache"></a><a h
 ref="http://www.apache.org/"; target="_blank" class="pull-left"><img 
src="res/images/asf_logo.svg" class="asf-logo" alt="The Apache Software 
Foundation"></a></div></div></header><main id="middle"><div><div 
id="mainLeft"><div id="nav-wrapper"><form 
action="https://www.google.com/search"; method="get"><div 
class="searchbox"><input value="tomcat.apache.org" name="sitesearch" 
type="hidden"><input aria-label="Search text" placeholder="Search&hellip;" 
required="required" name="q" id="query" 
type="search"><button>GO</button></div></form><div class="asfevents"><a 
href="https://www.apache.org/events/current-event.html";><img 
src="https://www.apache.org/events/current-event-234x60.png"; alt="Next ASF 
event"><br>
               Save the date!
             </a></div><nav><div><h2>Apache Tomcat</h2><ul><li><a 
href="./index.html">Home</a></li><li><a 
href="./taglibs.html">Taglibs</a></li><li><a href="./maven-plugin.html">Maven 
Plugin</a></li></ul></div><div><h2>Download</h2><ul><li><a 
href="./whichversion.html">Which version?</a></li><li><a 
href="https://tomcat.apache.org/download-10.cgi";>Tomcat 10</a></li><li><a 
href="https://tomcat.apache.org/download-90.cgi";>Tomcat 9</a></li><li><a 
href="https://tomcat.apache.org/download-80.cgi";>Tomcat 8</a></li><li><a 
href="https://tomcat.apache.org/download-migration.cgi";>Tomcat Migration Tool 
for Jakarta EE</a></li><li><a 
href="https://tomcat.apache.org/download-connectors.cgi";>Tomcat 
Connectors</a></li><li><a 
href="https://tomcat.apache.org/download-native.cgi";>Tomcat 
Native</a></li><li><a 
href="https://tomcat.apache.org/download-taglibs.cgi";>Taglibs</a></li><li><a 
href="https://archive.apache.org/dist/tomcat/";>Archives</a></li></ul></div><div><h2>Documentation</h2><ul><li><a
 href="./
 tomcat-10.1-doc/index.html">Tomcat 10.1 (alpha)</a></li><li><a 
href="./tomcat-10.0-doc/index.html">Tomcat 10.0</a></li><li><a 
href="./tomcat-9.0-doc/index.html">Tomcat 9.0</a></li><li><a 
href="./tomcat-8.5-doc/index.html">Tomcat 8.5</a></li><li><a 
href="./connectors-doc/">Tomcat Connectors</a></li><li><a 
href="./native-doc/">Tomcat Native</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT";>Wiki</a></li><li><a 
href="./migration.html">Migration Guide</a></li><li><a 
href="./presentations.html">Presentations</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/Bi8lBg";>Specifications</a></li></ul></div><div><h2>Problems?</h2><ul><li><a
 href="./security.html">Security Reports</a></li><li><a 
href="./findhelp.html">Find help</a></li><li><a 
href="https://cwiki.apache.org/confluence/display/TOMCAT/FAQ";>FAQ</a></li><li><a
 href="./lists.html">Mailing Lists</a></li><li><a href="./bugreport.html">Bug 
Database</a></li><li><a href="./irc.html">IRC</a></li></ul></div><div>
 <h2>Get Involved</h2><ul><li><a 
href="./getinvolved.html">Overview</a></li><li><a href="./source.html">Source 
code</a></li><li><a href="./ci.html">Buildbot</a></li><li><a 
href="https://cwiki.apache.org/confluence/x/vIPzBQ";>Translations</a></li><li><a 
href="./tools.html">Tools</a></li></ul></div><div><h2>Media</h2><ul><li><a 
href="https://twitter.com/theapachetomcat";>Twitter</a></li><li><a 
href="https://www.youtube.com/c/ApacheTomcatOfficial";>YouTube</a></li><li><a 
href="https://blogs.apache.org/tomcat/";>Blog</a></li></ul></div><div><h2>Misc</h2><ul><li><a
 href="./whoweare.html">Who We Are</a></li><li><a 
href="https://www.redbubble.com/people/comdev/works/30885254-apache-tomcat";>Swag</a></li><li><a
 href="./heritage.html">Heritage</a></li><li><a 
href="http://www.apache.org";>Apache Home</a></li><li><a 
href="./resources.html">Resources</a></li><li><a 
href="./contact.html">Contact</a></li><li><a 
href="./legal.html">Legal</a></li><li><a 
href="https://www.apache.org/foundation/contributing
 .html">Support Apache</a></li><li><a 
href="https://www.apache.org/foundation/sponsorship.html";>Sponsorship</a></li><li><a
 href="http://www.apache.org/foundation/thanks.html";>Thanks</a></li><li><a 
href="http://www.apache.org/licenses/";>License</a></li></ul></div></nav></div></div><div
 id="mainRight"><div id="content"><h2 style="display: none;">Content</h2><h3 
id="Table_of_Contents">Table of Contents</h3><div class="text">
-<ul><li><a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x 
vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in 
Apache Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed 
in Apache Tomcat 9.0.40</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed in Apache Tomcat 
9.0.38</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache 
Tomcat 9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in 
Apache Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed 
in Apache Tomcat 9.0.35</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed in Apache Tomcat 
9.0.31</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache 
Tomcat 9.0.30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in 
Apache Tomcat 9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed 
in Apache Tomcat 9.0.20</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in Apache Tomcat 9.0.
 19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed in Apache Tomcat 
9.0.16</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache 
Tomcat 9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in 
Apache Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed 
in Apache Tomcat 9.0.9</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed in Apache Tomcat 
9.0.8</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache 
Tomcat 9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in 
Apache Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed 
in Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 
9.0.0.M22</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in 
Apache Tomcat 9.0.0.M21</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in Apache Tomcat 
9.0.0.M19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in 
Apache T
 omcat 9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed 
in Apache Tomcat 9.0.0.M17</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 
9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in 
Apache Tomcat 9.0.0.M13</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
Apache Tomcat 9.0.0.M8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
9.0.0.M3</a></li></ul>
+<ul><li><a href="#Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x 
vulnerabilities</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.48">Fixed in 
Apache Tomcat 9.0.48</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.46">Fixed 
in Apache Tomcat 9.0.46</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.45">Fixed in Apache Tomcat 
9.0.45</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.43">Fixed in Apache 
Tomcat 9.0.43</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.40">Fixed in 
Apache Tomcat 9.0.40</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.38">Fixed 
in Apache Tomcat 9.0.38</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.37">Fixed in Apache Tomcat 
9.0.37</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.36">Fixed in Apache 
Tomcat 9.0.36</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.35">Fixed in 
Apache Tomcat 9.0.35</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.31">Fixed 
in Apache Tomcat 9.0.31</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.30">Fixed in Apache Tomcat 9.0.
 30</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.29">Fixed in Apache Tomcat 
9.0.29</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.20">Fixed in Apache 
Tomcat 9.0.20</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.19">Fixed in 
Apache Tomcat 9.0.19</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.16">Fixed 
in Apache Tomcat 9.0.16</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.12">Fixed in Apache Tomcat 
9.0.12</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.10">Fixed in Apache 
Tomcat 9.0.10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.9">Fixed in 
Apache Tomcat 9.0.9</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.8">Fixed 
in Apache Tomcat 9.0.8</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.5">Fixed in Apache Tomcat 
9.0.5</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.2">Fixed in Apache 
Tomcat 9.0.2</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.1">Fixed in 
Apache Tomcat 9.0.1</a></li><li><a 
href="#Fixed_in_Apache_Tomcat_9.0.0.M22">Fixed in Apache Tomcat 9.0.0.M22</a
 ></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M21">Fixed in Apache Tomcat 
 >9.0.0.M21</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M19">Fixed in 
 >Apache Tomcat 9.0.0.M19</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.0.M18">Fixed in Apache Tomcat 
 >9.0.0.M18</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M17">Fixed in 
 >Apache Tomcat 9.0.0.M17</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.0.M15">Fixed in Apache Tomcat 
 >9.0.0.M15</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M13">Fixed in 
 >Apache Tomcat 9.0.0.M13</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.0.M10">Fixed in Apache Tomcat 
 >9.0.0.M10</a></li><li><a href="#Fixed_in_Apache_Tomcat_9.0.0.M8">Fixed in 
 >Apache Tomcat 9.0.0.M8</a></li><li><a 
 >href="#Fixed_in_Apache_Tomcat_9.0.0.M3">Fixed in Apache Tomcat 
 >9.0.0.M3</a></li></ul>
 </div><h3 id="Apache_Tomcat_9.x_vulnerabilities">Apache Tomcat 9.x 
vulnerabilities</h3><div class="text">
     <p>This page lists all security vulnerabilities fixed in released versions
        of Apache Tomcat 9.x. Each vulnerability is given a
@@ -39,6 +39,84 @@
        <a href="security.html">Tomcat Security Team</a>. Thank you.
     </p>
 
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.48"><span class="pull-right">15 
June 2021</span> Fixed in Apache Tomcat 9.0.48</h3><div class="text">
+
+    <p><i>Note: The issue below was fixed in Apache Tomcat 9.0.47 but the
+       release vote for the 9.0.47 release candidate did not pass. Therefore,
+       although users must download 9.0.48 to obtain a version that includes a
+       fix for this issue, version 9.0.47 is not included in the list of 
+       affected versions.</i></p>
+
+    <p><strong>Important: Request Smuggling</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-33037"; 
rel="nofollow">CVE-2021-33037</a></p>
+
+    <p>Apache Tomcat did not correctly parse the HTTP transfer-encoding request
+       header in some circumstances leading to the possibility of request
+       smuggling when used with a reverse proxy. Specifically: Tomcat
+       incorrectly ignored the transfer-encoding header if the client declared
+       it would only accept an HTTP/1.0 response; Tomcat honoured the identify
+       encoding; and Tomcat did not ensure that, if present, the chunked
+       encoding was the final encoding.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/45d70a86a901cbd534f8f570bed2aec9f7f7b88e";>45d70a86</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/05f9e8b00f5d9251fcd3c95dcfd6cf84177f46c8";>05f9e8b0</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/a2c3dc4c96168743ac0bab613709a5bbdaec41d0";>a2c3dc4c</a>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security team by Bahruz
+       Jabiyev, Steven Sprecher and Kaan Onarlioglu of NEU seclab on 7 May 
2021.
+       The issue was made public on 12 July 2021.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.46</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.46"><span class="pull-right">12 May 
2021</span> Fixed in Apache Tomcat 9.0.46</h3><div class="text">
+
+      <p><strong>Low: Authentication weakness</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30640"; 
rel="nofollow">CVE-2021-30640</a></p>
+
+    <p>Queries made by the JNDI Realm did not always correctly escape
+       parameters. Parameter values could be sourced from user provided data 
(eg
+       user names) as well as configuration data provided by an administrator.
+       In limited circumstances it was possible for users to authenticate using
+       variations of their user name and/or to bypass some of the protection
+       provided by the LockOut Realm.</p>
+
+    <p>This was fixed with commits
+       <a 
href="https://github.com/apache/tomcat/commit/c4df8d44a959a937d507d15e5b1ca35c3dbc41eb";>c4df8d44</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/749f3cc192c68c34f2375509aea087be45fc4434";>749f3cc1</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/c6b6e1015ae44c936971b6bf8bce70987935b92e";>c6b6e101</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/91ecdc61ce3420054c04114baaaf1c1e0cbd5d56";>91ecdc61</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/e50067486cf86564175ca0cfdcbf7d209c6df862";>e5006748</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/b5585a9e5d4fec020cc5ebadb82f899fae22bc43";>b5585a9e</a>,
+       <a 
href="https://github.com/apache/tomcat/commit/329932012d3a9b95fde0b18618416e659ecffdc0";>32993201</a>
 and
+       <a 
href="https://github.com/apache/tomcat/commit/3ce84512ed8783577d9945df28da5a033465b945";>3ce84512</a>.</p>
+
+    <p>This issue was reported publicly as <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=65224";>65224</a>.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.45</p>
+
+  </div><h3 id="Fixed_in_Apache_Tomcat_9.0.45"><span class="pull-right">6 
April 2021</span> Fixed in Apache Tomcat 9.0.45</h3><div class="text">
+
+    <p><strong>Important: Denial of Service</strong>
+       <a href="http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2021-30639"; 
rel="nofollow">CVE-2021-30639</a></p>
+
+    <p>An error introduced as part of a change to improve error handling during
+       non-blocking I/O meant that the error flag associated with the Request
+       object was not reset between requests. This meant that once a
+       non-blocking I/O error occurred, all future requests handled by that
+       request object would fail. Users were able to trigger non-blocking I/O
+       errors, e.g. by dropping a connection, thereby creating the possibility
+       of triggering a DoS.</p>
+    <o>Applications that do not use non-blocking I/O are not exposed to this
+       vulnerability.</o>
+
+    <p>This was fixed with commit
+       <a 
href="https://github.com/apache/tomcat/commit/8ece47c4a9fb9349e8862c84358a4dd23c643a24";>8ece47c4</a>.</p>
+
+    <p>This issue was reported publicly as <a 
href="https://bz.apache.org/bugzilla/show_bug.cgi?id=65203";>65203</a>.</p>
+
+    <p>Affects: 9.0.44</p>
+    
   </div><h3 id="Fixed_in_Apache_Tomcat_9.0.43"><span class="pull-right">2 
February 2021</span> Fixed in Apache Tomcat 9.0.43</h3><div class="text">
 
     <p><i>Note: The issues below were fixed in Apache Tomcat 9.0.42 but the

Modified: tomcat/site/trunk/xdocs/security-10.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-10.xml?rev=1891484&r1=1891483&r2=1891484&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-10.xml (original)
+++ tomcat/site/trunk/xdocs/security-10.xml Mon Jul 12 13:02:22 2021
@@ -50,6 +50,84 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 10.0.7" rtext="15 June 2021">
+
+    <p><strong>Important: Request Smuggling</strong>
+       <cve>CVE-2021-33037</cve></p>
+
+    <p>Apache Tomcat did not correctly parse the HTTP transfer-encoding request
+       header in some circumstances leading to the possibility of request
+       smuggling when used with a reverse proxy. Specifically: Tomcat
+       incorrectly ignored the transfer-encoding header if the client declared
+       it would only accept an HTTP/1.0 response; Tomcat honoured the identify
+       encoding; and Tomcat did not ensure that, if present, the chunked
+       encoding was the final encoding.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="eee0d024c1b3171560c92eaba79dd6eb8eb11bcd"/>,
+       <hashlink hash="506134f957a4be2c5b4a9334f7b3435fc954dbc1"/> and
+       <hashlink hash="19d11556d0db99df291df33605f137976d152475"/>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security team by Bahruz
+       Jabiyev, Steven Sprecher and Kaan Onarlioglu of NEU seclab on 7 May 
2021.
+       The issue was made public on 12 July 2021.</p>
+
+    <p>Affects: 10.0.0-M1 to 10.0.6</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 10.0.6" rtext="12 May 2021">
+
+      <p><strong>Low: Authentication weakness</strong>
+       <cve>CVE-2021-30640</cve></p>
+
+    <p>Queries made by the JNDI Realm did not always correctly escape
+       parameters. Parameter values could be sourced from user provided data 
(eg
+       user names) as well as configuration data provided by an administrator.
+       In limited circumstances it was possible for users to authenticate using
+       variations of their user name and/or to bypass some of the protection
+       provided by the LockOut Realm.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="f4d9bdef53ec009b7717620d890465fa273721a6"/>,
+       <hashlink hash="4e61e1d625a4a64d6b775e3a03c77a0b100d56d7"/>,
+       <hashlink hash="d5303a506c7533803d2b3bc46e6120ce673a6667"/>,
+       <hashlink hash="b930d0b3161d9ec78d5fa57f886ed2de4680518b"/>,
+       <hashlink hash="17208c645d68d2af1444ee8c64f36a9b8f0ba76f"/>,
+       <hashlink hash="bd4d1fbe9146dff4714130594afd668406a6a5ef"/>,
+       <hashlink hash="81f16b0a7186ed02efbfac336589d6cff28d1e89"/> and
+       <hashlink hash="eeb7351219bd8803c0053e1e80444664a7cf5b51"/>.</p>
+
+    <p>This issue was reported publicly as <bug>65224</bug>.</p>
+
+    <p>Affects: 10.0.0-M1 to 10.0.5</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 10.0.5" rtext="6 April 2021">
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2021-30639</cve></p>
+
+    <p>An error introduced as part of a change to improve error handling during
+       non-blocking I/O meant that the error flag associated with the Request
+       object was not reset between requests. This meant that once a
+       non-blocking I/O error occurred, all future requests handled by that
+       request object would fail. Users were able to trigger non-blocking I/O
+       errors, e.g. by dropping a connection, thereby creating the possibility
+       of triggering a DoS.</p>
+    <o>Applications that do not use non-blocking I/O are not exposed to this
+       vulnerability.</o>
+
+    <p>This was fixed with commit
+       <hashlink hash="b59099e4ca501a039510334ebe1024971cd6f959"/>.</p>
+
+    <p>This issue was reported publicly as <bug>65203</bug>.</p>
+
+    <p>Affects: 10.0.3 to 10.0.4</p>
+    
+  </section>
+
   <section name="Fixed in Apache Tomcat 10.0.2" rtext="2 February 2021">
 
     <p><i>Note: The issues below were fixed in Apache Tomcat 10.0.1 but the

Modified: tomcat/site/trunk/xdocs/security-7.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-7.xml?rev=1891484&r1=1891483&r2=1891484&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-7.xml (original)
+++ tomcat/site/trunk/xdocs/security-7.xml Mon Jul 12 13:02:22 2021
@@ -50,6 +50,27 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 7.0.109" rtext="26 April 2021">
+
+      <p><strong>Low: Authentication weakness</strong>
+       <cve>CVE-2021-30640</cve></p>
+
+    <p>Queries made by the JNDI Realm did not always correctly escape
+       parameters. Parameter values could be sourced from user provided data 
(eg
+       user names) as well as configuration data provided by an administrator.
+       In limited circumstances it was possible for users to authenticate using
+       variations of their user name and/or to bypass some of the protection
+       provided by the LockOut Realm.</p>
+
+    <p>This was fixed with commit
+       <hashlink hash="e21eb4764ccda55e5a35a5a7c19a6fd2b0757fe9"/>.</p>
+
+    <p>This issue was reported publicly as <bug>65224</bug>.</p>
+
+    <p>Affects: 7.0.0 to 7.0.108</p>
+
+  </section>
+  
   <section name="Fixed in Apache Tomcat 7.0.108" rtext="5 February 2021">
 
     <p><strong>Low: Fix for <cve>CVE-2020-9484</cve> was incomplete</strong>

Modified: tomcat/site/trunk/xdocs/security-8.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-8.xml?rev=1891484&r1=1891483&r2=1891484&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-8.xml (original)
+++ tomcat/site/trunk/xdocs/security-8.xml Mon Jul 12 13:02:22 2021
@@ -56,6 +56,92 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 8.5.68" rtext="15 June 2021">
+
+    <p><i>Note: The issue below was fixed in Apache Tomcat 8.5.67 but the
+       release vote for the 8.5.67 release candidate did not pass. Therefore,
+       although users must download 8.5.68 to obtain a version that includes a
+       fix for this issue, version 8.5.67 is not included in the list of 
+       affected versions.</i></p>
+
+    <p><strong>Important: Request Smuggling</strong>
+       <cve>CVE-2021-33037</cve></p>
+
+    <p>Apache Tomcat did not correctly parse the HTTP transfer-encoding request
+       header in some circumstances leading to the possibility of request
+       smuggling when used with a reverse proxy. Specifically: Tomcat
+       incorrectly ignored the transfer-encoding header if the client declared
+       it would only accept an HTTP/1.0 response; Tomcat honoured the identify
+       encoding; and Tomcat did not ensure that, if present, the chunked
+       encoding was the final encoding.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="3202703e6d635e39b74262e81f0cb4bcbe2170dc"/>,
+       <hashlink hash="da0e7cb093cf68b052d9175e469dbd0464441b0b"/> and
+       <hashlink hash="8874fa02e9b36baa9ca6b226c0882c0190ca5a02"/>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security team by Bahruz
+       Jabiyev, Steven Sprecher and Kaan Onarlioglu of NEU seclab on 7 May 
2021.
+       The issue was made public on 12 July 2021.</p>
+
+    <p>This issue was identified and reported responsibly .</p>
+
+    <p>Affects: 8.5.0 to 8.5.66</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 8.5.66" rtext="12 May 2021">
+
+      <p><strong>Low: Authentication weakness</strong>
+       <cve>CVE-2021-30640</cve></p>
+
+    <p>Queries made by the JNDI Realm did not always correctly escape
+       parameters. Parameter values could be sourced from user provided data 
(eg
+       user names) as well as configuration data provided by an administrator.
+       In limited circumstances it was possible for users to authenticate using
+       variations of their user name and/or to bypass some of the protection
+       provided by the LockOut Realm.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="24dfb30076997b640e5123e92c4b8d7f206f609c"/>,
+       <hashlink hash="0a272b00aed57526dbfc8b881ab253c23c61f100"/>,
+       <hashlink hash="c9f21a2a7908c7c4ecd4f9bb495d3ee36a2bd822"/>,
+       <hashlink hash="4e86b4ea0d1a9b00fa93971c31b93ad1bd49c7fe"/>,
+       <hashlink hash="79580e7f70a07c083be07307376511bb864d5a7b"/>,
+       <hashlink hash="d3407672774e372fae8b5898d55f85d16f22b972"/>,
+       <hashlink hash="6a9129ac9bd06555ce04bb564a76fc3987311f38"/> and
+       <hashlink hash="ad22db641dcd61c2e8078f658fa709897b5da375"/>.</p>
+
+    <p>This issue was reported publicly as <bug>65224</bug>.</p>
+
+    <p>Affects: 8.5.0 to 8.5.65</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 8.5.65" rtext="6 April 2021">
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2021-30639</cve></p>
+
+    <p>An error introduced as part of a change to improve error handling during
+       non-blocking I/O meant that the error flag associated with the Request
+       object was not reset between requests. This meant that once a
+       non-blocking I/O error occurred, all future requests handled by that
+       request object would fail. Users were able to trigger non-blocking I/O
+       errors, e.g. by dropping a connection, thereby creating the possibility
+       of triggering a DoS.</p>
+    <o>Applications that do not use non-blocking I/O are not exposed to this
+       vulnerability.</o>
+
+    <p>This was fixed with commit
+       <hashlink hash="411caf29ac1c16e6ac291b6e5543b2371dbd25e2"/>.</p>
+
+    <p>This issue was reported publicly as <bug>65203</bug>.</p>
+
+    <p>Affects: 8.5.64</p>
+    
+  </section>
+
   <section name="Fixed in Apache Tomcat 8.5.63" rtext="2 February 2021">
 
     <p><i>Note: The issues below were fixed in Apache Tomcat 8.5.62 but the

Modified: tomcat/site/trunk/xdocs/security-9.xml
URL: 
http://svn.apache.org/viewvc/tomcat/site/trunk/xdocs/security-9.xml?rev=1891484&r1=1891483&r2=1891484&view=diff
==============================================================================
--- tomcat/site/trunk/xdocs/security-9.xml (original)
+++ tomcat/site/trunk/xdocs/security-9.xml Mon Jul 12 13:02:22 2021
@@ -50,6 +50,90 @@
 
   </section>
 
+  <section name="Fixed in Apache Tomcat 9.0.48" rtext="15 June 2021">
+
+    <p><i>Note: The issue below was fixed in Apache Tomcat 9.0.47 but the
+       release vote for the 9.0.47 release candidate did not pass. Therefore,
+       although users must download 9.0.48 to obtain a version that includes a
+       fix for this issue, version 9.0.47 is not included in the list of 
+       affected versions.</i></p>
+
+    <p><strong>Important: Request Smuggling</strong>
+       <cve>CVE-2021-33037</cve></p>
+
+    <p>Apache Tomcat did not correctly parse the HTTP transfer-encoding request
+       header in some circumstances leading to the possibility of request
+       smuggling when used with a reverse proxy. Specifically: Tomcat
+       incorrectly ignored the transfer-encoding header if the client declared
+       it would only accept an HTTP/1.0 response; Tomcat honoured the identify
+       encoding; and Tomcat did not ensure that, if present, the chunked
+       encoding was the final encoding.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="45d70a86a901cbd534f8f570bed2aec9f7f7b88e"/>,
+       <hashlink hash="05f9e8b00f5d9251fcd3c95dcfd6cf84177f46c8"/> and
+       <hashlink hash="a2c3dc4c96168743ac0bab613709a5bbdaec41d0"/>.</p>
+
+    <p>This issue was reported to the Apache Tomcat Security team by Bahruz
+       Jabiyev, Steven Sprecher and Kaan Onarlioglu of NEU seclab on 7 May 
2021.
+       The issue was made public on 12 July 2021.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.46</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 9.0.46" rtext="12 May 2021">
+
+      <p><strong>Low: Authentication weakness</strong>
+       <cve>CVE-2021-30640</cve></p>
+
+    <p>Queries made by the JNDI Realm did not always correctly escape
+       parameters. Parameter values could be sourced from user provided data 
(eg
+       user names) as well as configuration data provided by an administrator.
+       In limited circumstances it was possible for users to authenticate using
+       variations of their user name and/or to bypass some of the protection
+       provided by the LockOut Realm.</p>
+
+    <p>This was fixed with commits
+       <hashlink hash="c4df8d44a959a937d507d15e5b1ca35c3dbc41eb"/>,
+       <hashlink hash="749f3cc192c68c34f2375509aea087be45fc4434"/>,
+       <hashlink hash="c6b6e1015ae44c936971b6bf8bce70987935b92e"/>,
+       <hashlink hash="91ecdc61ce3420054c04114baaaf1c1e0cbd5d56"/>,
+       <hashlink hash="e50067486cf86564175ca0cfdcbf7d209c6df862"/>,
+       <hashlink hash="b5585a9e5d4fec020cc5ebadb82f899fae22bc43"/>,
+       <hashlink hash="329932012d3a9b95fde0b18618416e659ecffdc0"/> and
+       <hashlink hash="3ce84512ed8783577d9945df28da5a033465b945"/>.</p>
+
+    <p>This issue was reported publicly as <bug>65224</bug>.</p>
+
+    <p>Affects: 9.0.0.M1 to 9.0.45</p>
+
+  </section>
+  
+  <section name="Fixed in Apache Tomcat 9.0.45" rtext="6 April 2021">
+
+    <p><strong>Important: Denial of Service</strong>
+       <cve>CVE-2021-30639</cve></p>
+
+    <p>An error introduced as part of a change to improve error handling during
+       non-blocking I/O meant that the error flag associated with the Request
+       object was not reset between requests. This meant that once a
+       non-blocking I/O error occurred, all future requests handled by that
+       request object would fail. Users were able to trigger non-blocking I/O
+       errors, e.g. by dropping a connection, thereby creating the possibility
+       of triggering a DoS.</p>
+    <o>Applications that do not use non-blocking I/O are not exposed to this
+       vulnerability.</o>
+
+    <p>This was fixed with commit
+       <hashlink hash="8ece47c4a9fb9349e8862c84358a4dd23c643a24"/>.</p>
+
+    <p>This issue was reported publicly as <bug>65203</bug>.</p>
+
+    <p>Affects: 9.0.44</p>
+    
+  </section>
+
   <section name="Fixed in Apache Tomcat 9.0.43" rtext="2 February 2021">
 
     <p><i>Note: The issues below were fixed in Apache Tomcat 9.0.42 but the



---------------------------------------------------------------------
To unsubscribe, e-mail: dev-unsubscr...@tomcat.apache.org
For additional commands, e-mail: dev-h...@tomcat.apache.org

Reply via email to