Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests
could lead to request and/or response mix-up between users.
This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95.
Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue.
Metrics
Affected Vendors & Products
References
History
Fri, 24 Jan 2025 20:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Sat, 23 Nov 2024 03:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
| |
Metrics |
threat_severity
|
threat_severity
|
Fri, 22 Nov 2024 12:00:00 +0000
Type | Values Removed | Values Added |
---|---|---|
References |
|
Mon, 18 Nov 2024 15:15:00 +0000
Type | Values Removed | Values Added |
---|---|---|
First Time appeared |
Apache
Apache tomcat |
|
Weaknesses | CWE-326 | |
CPEs | cpe:2.3:a:apache:tomcat:-:*:*:*:*:*:*:* | |
Vendors & Products |
Apache
Apache tomcat |
|
Metrics |
cvssV3_1
|
Mon, 18 Nov 2024 11:45:00 +0000
Type | Values Removed | Values Added |
---|---|---|
Description | Incorrect object re-cycling and re-use vulnerability in Apache Tomcat. Incorrect recycling of the request and response used by HTTP/2 requests could lead to request and/or response mix-up between users. This issue affects Apache Tomcat: from 11.0.0-M23 through 11.0.0-M26, from 10.1.27 through 10.1.30, from 9.0.92 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fixes the issue. | |
Title | Apache Tomcat: Request/response mix-up with HTTP/2 | |
References |
|

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-01-24T20:03:10.485Z
Reserved: 2024-11-07T07:45:03.449Z
Link: CVE-2024-52317

Updated: 2024-11-18T18:03:24.879Z

Status : Awaiting Analysis
Published: 2024-11-18T12:15:18.727
Modified: 2025-01-24T20:15:32.963
Link: CVE-2024-52317
