CVE-2014-0227
mediumCVSS v3 Base Score
6.4
AV:N/AC:L/Au:N/C:N/I:P/A:P
EPSS Score
78.2%
Exploitation probability in 30 days
Top 1% most likely to be exploited
Attack Characteristics
Attack Vector
Network
Attack Complexity
Low
Confidentiality
None
Integrity
P
Availability
P
Vulnerability Report
Generated by CyberWatcher
Description
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
CWE
CWE-19Affected Products
apache tomcat