Rewterz Threat Alert – Active Lokibot Malware IOCs
December 3, 2020Rewterz Threat Alert – Phishing Campaign Regarding Emergency Financial Aid For Covid-19
December 4, 2020Rewterz Threat Alert – Active Lokibot Malware IOCs
December 3, 2020Rewterz Threat Alert – Phishing Campaign Regarding Emergency Financial Aid For Covid-19
December 4, 2020Severity
Medium
Analysis Summary
Apache Tomcat could allow a remote attacker to obtain sensitive information, caused by an issue with the HTTP request header value can be reused from the previous stream received on an HTTP/2 connection. By sending a specially-crafted HTTP request, an attacker could exploit this vulnerability to obtain sensitive information, and use this information to launch further attacks against the affected system.
Impact
Information disclosure
Affected Vendors
Apache Tomcat
Affected Products
- Apache Tomcat 10.0.0 M1
- Apache Tomcat 8.5.1
- Apache Tomcat 9.0.0.M5
- Apache Tomcat 8.5.59
- Apache Tomcat 9.0.39
- Apache Tomcat 10.0.0-M9
Remediation
Upgrade to the latest version of Apache Tomcat (8.5.60, 9.0.40, 10.0.0-M10 or later).