Vulnerability Details CVE-2014-0227
java/org/apache/coyote/http11/filters/ChunkedInputFilter.java in Apache Tomcat 6.x before 6.0.42, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle attempts to continue reading data after an error has occurred, which allows remote attackers to conduct HTTP request smuggling attacks or cause a denial of service (resource consumption) by streaming data with malformed chunked transfer coding.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.837
EPSS Ranking 99.2%
CVSS Severity
CVSS v2 Score 6.4
Products affected by CVE-2014-0227
-
cpe:2.3:a:apache:tomcat:6.0.0
-
cpe:2.3:a:apache:tomcat:6.0.1
-
cpe:2.3:a:apache:tomcat:6.0.10
-
cpe:2.3:a:apache:tomcat:6.0.11
-
cpe:2.3:a:apache:tomcat:6.0.12
-
cpe:2.3:a:apache:tomcat:6.0.13
-
cpe:2.3:a:apache:tomcat:6.0.14
-
cpe:2.3:a:apache:tomcat:6.0.15
-
cpe:2.3:a:apache:tomcat:6.0.16
-
cpe:2.3:a:apache:tomcat:6.0.17
-
cpe:2.3:a:apache:tomcat:6.0.18
-
cpe:2.3:a:apache:tomcat:6.0.19
-
cpe:2.3:a:apache:tomcat:6.0.2
-
cpe:2.3:a:apache:tomcat:6.0.20
-
cpe:2.3:a:apache:tomcat:6.0.24
-
cpe:2.3:a:apache:tomcat:6.0.26
-
cpe:2.3:a:apache:tomcat:6.0.27
-
cpe:2.3:a:apache:tomcat:6.0.28
-
cpe:2.3:a:apache:tomcat:6.0.29
-
cpe:2.3:a:apache:tomcat:6.0.3
-
cpe:2.3:a:apache:tomcat:6.0.30
-
cpe:2.3:a:apache:tomcat:6.0.31
-
cpe:2.3:a:apache:tomcat:6.0.32
-
cpe:2.3:a:apache:tomcat:6.0.33
-
cpe:2.3:a:apache:tomcat:6.0.35
-
cpe:2.3:a:apache:tomcat:6.0.36
-
cpe:2.3:a:apache:tomcat:6.0.37
-
cpe:2.3:a:apache:tomcat:6.0.39
-
cpe:2.3:a:apache:tomcat:6.0.4
-
cpe:2.3:a:apache:tomcat:6.0.41
-
cpe:2.3:a:apache:tomcat:6.0.5
-
cpe:2.3:a:apache:tomcat:6.0.6
-
cpe:2.3:a:apache:tomcat:6.0.7
-
cpe:2.3:a:apache:tomcat:6.0.8
-
cpe:2.3:a:apache:tomcat:6.0.9
-
cpe:2.3:a:apache:tomcat:7.0.0
-
cpe:2.3:a:apache:tomcat:7.0.1
-
cpe:2.3:a:apache:tomcat:7.0.10
-
cpe:2.3:a:apache:tomcat:7.0.11
-
cpe:2.3:a:apache:tomcat:7.0.12
-
cpe:2.3:a:apache:tomcat:7.0.13
-
cpe:2.3:a:apache:tomcat:7.0.14
-
cpe:2.3:a:apache:tomcat:7.0.15
-
cpe:2.3:a:apache:tomcat:7.0.16
-
cpe:2.3:a:apache:tomcat:7.0.17
-
cpe:2.3:a:apache:tomcat:7.0.18
-
cpe:2.3:a:apache:tomcat:7.0.19
-
cpe:2.3:a:apache:tomcat:7.0.2
-
cpe:2.3:a:apache:tomcat:7.0.20
-
cpe:2.3:a:apache:tomcat:7.0.21
-
cpe:2.3:a:apache:tomcat:7.0.22
-
cpe:2.3:a:apache:tomcat:7.0.23
-
cpe:2.3:a:apache:tomcat:7.0.24
-
cpe:2.3:a:apache:tomcat:7.0.25
-
cpe:2.3:a:apache:tomcat:7.0.26
-
cpe:2.3:a:apache:tomcat:7.0.27
-
cpe:2.3:a:apache:tomcat:7.0.28
-
cpe:2.3:a:apache:tomcat:7.0.29
-
cpe:2.3:a:apache:tomcat:7.0.3
-
cpe:2.3:a:apache:tomcat:7.0.30
-
cpe:2.3:a:apache:tomcat:7.0.31
-
cpe:2.3:a:apache:tomcat:7.0.32
-
cpe:2.3:a:apache:tomcat:7.0.33
-
cpe:2.3:a:apache:tomcat:7.0.34
-
cpe:2.3:a:apache:tomcat:7.0.35
-
cpe:2.3:a:apache:tomcat:7.0.36
-
cpe:2.3:a:apache:tomcat:7.0.37
-
cpe:2.3:a:apache:tomcat:7.0.38
-
cpe:2.3:a:apache:tomcat:7.0.39
-
cpe:2.3:a:apache:tomcat:7.0.4
-
cpe:2.3:a:apache:tomcat:7.0.40
-
cpe:2.3:a:apache:tomcat:7.0.41
-
cpe:2.3:a:apache:tomcat:7.0.42
-
cpe:2.3:a:apache:tomcat:7.0.43
-
cpe:2.3:a:apache:tomcat:7.0.44
-
cpe:2.3:a:apache:tomcat:7.0.45
-
cpe:2.3:a:apache:tomcat:7.0.46
-
cpe:2.3:a:apache:tomcat:7.0.47
-
cpe:2.3:a:apache:tomcat:7.0.48
-
cpe:2.3:a:apache:tomcat:7.0.49
-
cpe:2.3:a:apache:tomcat:7.0.5
-
cpe:2.3:a:apache:tomcat:7.0.50
-
cpe:2.3:a:apache:tomcat:7.0.52
-
cpe:2.3:a:apache:tomcat:7.0.53
-
cpe:2.3:a:apache:tomcat:7.0.54
-
cpe:2.3:a:apache:tomcat:7.0.6
-
cpe:2.3:a:apache:tomcat:7.0.7
-
cpe:2.3:a:apache:tomcat:7.0.8
-
cpe:2.3:a:apache:tomcat:7.0.9
-
cpe:2.3:a:apache:tomcat:8.0.0
-
cpe:2.3:a:apache:tomcat:8.0.1
-
cpe:2.3:a:apache:tomcat:8.0.3
-
cpe:2.3:a:apache:tomcat:8.0.5
-
cpe:2.3:a:apache:tomcat:8.0.8