CVE-2014-0227

medium Apache
CVSS v3 Base Score
6.4
AV:N/AC:L/Au:N/C:N/I:P/A:P
EPSS Score
78.2%
Exploitation probability in 30 days
Top 1% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Confidentiality
None
Integrity
P
Availability
P
Published: February 16, 2015 (4106 days ago)
Last Modified: May 6, 2026
Vendor: Apache
Source: NVD

Description

java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.

CWE

CWE-19

Affected Products

apache tomcat

References