git: c42efc2b00b0 - main - security/vuxml: Document Apache Tomcat vulnerability

From: Nuno Teixeira <eduardo_at_FreeBSD.org>
Date: Fri, 18 Nov 2022 21:58:21 UTC
The branch main has been updated by eduardo:

URL: https://cgit.FreeBSD.org/ports/commit/?id=c42efc2b00b09f75badbd82788ed8c33157470b8

commit c42efc2b00b09f75badbd82788ed8c33157470b8
Author:     Nuno Teixeira <eduardo@FreeBSD.org>
AuthorDate: 2022-11-18 21:53:01 +0000
Commit:     Nuno Teixeira <eduardo@FreeBSD.org>
CommitDate: 2022-11-18 21:57:50 +0000

    security/vuxml: Document Apache Tomcat vulnerability
    
     * CVE-2022-42252 Apache Tomcat - Request Smuggling
    
    PR:             266984
---
 security/vuxml/vuln/2022.xml | 52 ++++++++++++++++++++++++++++++++++++++++++++
 1 file changed, 52 insertions(+)

diff --git a/security/vuxml/vuln/2022.xml b/security/vuxml/vuln/2022.xml
index 4a01fca8cf06..7932633d0b77 100644
--- a/security/vuxml/vuln/2022.xml
+++ b/security/vuxml/vuln/2022.xml
@@ -1,3 +1,55 @@
+  <vuln vid="556fdf03-6785-11ed-953b-002b67dfc673">
+    <topic>Tomcat -- Request Smuggling</topic>
+    <affects>
+      <package>
+	<name>tomcat</name>
+	<range><ge>8.5.0</ge><lt>8.5.83</lt></range>
+	<range><ge>9.0.0-M1</ge><lt>9.0.68</lt></range>
+	<range><ge>10.0.0-M1</ge><lt>10.0.27</lt></range>
+	<range><ge>10.1.0-M1</ge><lt>10.1.1</lt></range>
+      </package>
+      <package>
+	<name>tomcat85</name>
+	<range><ge>8.5.0</ge><lt>8.5.83</lt></range>
+      </package>
+      <package>
+	<name>tomcat9</name>
+	<range><ge>9.0.0-M1</ge><lt>9.0.68</lt></range>
+      </package>
+      <package>
+	<name>tomcat10</name>
+	<range><ge>10.0.0-M1</ge><lt>10.0.27</lt></range>
+      </package>
+      <package>
+	<name>tomcat101</name>
+	<range><ge>10.1.0-M1</ge><lt>10.1.1</lt></range>
+      </package>
+      <package>
+	<name>tomcat-devel</name>
+	<range><ge>10.1.0-M1</ge><lt>10.1.1</lt></range>
+      </package>
+    </affects>
+    <description>
+      <body xmlns="http://www.w3.org/1999/xhtml">
+	<p>Apache Tomcat reports:</p>
+	<blockquote cite="https://lists.apache.org/thread/zzcxzvqfdqn515zfs3dxb7n8gty589sq">
+	  <p>
+	  If Tomcat was configured to ignore invalid HTTP headers via setting rejectIllegalHeader to false (the default for 8.5.x only), Tomcat did not reject a request containing an invalid Content-Length header making a request smuggling attack possible if Tomcat was located behind a reverse proxy that also failed to reject the request with the invalid header.
+	  </p>
+	  <p>The CVSS score for this vulnerability is 7.5 High</p>
+	</blockquote>
+      </body>
+    </description>
+    <references>
+      <cvename>CVE-2022-42252</cvename>
+      <url>https://nvd.nist.gov/vuln/detail/CVE-2022-42252</url>
+    </references>
+    <dates>
+      <discovery>2022-10-31</discovery>
+      <entry>2022-11-18</entry>
+    </dates>
+  </vuln>
+
   <vuln vid="094e4a5b-6511-11ed-8c5e-206a8a720317">
     <topic>krb5 -- Integer overflow vulnerabilities in PAC parsing</topic>
     <affects>