Skip to content

Uncontrolled Resource Consumption in Apache Tomcat

High severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Mar 1, 2024

Package

maven org.apache.tomcat:tomcat (Maven)

Affected versions

>= 6.0.0, < 6.0.44
>= 7.0.0, < 7.0.55
>= 8.0.0, < 8.0.9

Patched versions

6.0.44
7.0.55
8.0.9

Description

Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.55, and 8.x before 8.0.9 does not properly handle cases where an HTTP response occurs before finishing the reading of an entire request body, which allows remote attackers to cause a denial of service (thread consumption) via a series of aborted upload attempts.

References

Published by the National Vulnerability Database Jun 7, 2015
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jul 7, 2022
Last updated Mar 1, 2024

Severity

High

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(91st percentile)

Weaknesses

Uncontrolled Resource Consumption

The product does not properly control the allocation and maintenance of a limited resource, thereby enabling an actor to influence the amount of resources consumed, eventually leading to the exhaustion of available resources. Learn more on MITRE.

CVE ID

CVE-2014-0230

GHSA ID

GHSA-pxcx-cxq8-4mmw

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.