The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2020-17527

CVE-2020-17527: Apache Tomcat Information Disclosure Flaw

CVE-2020-17527 is an information disclosure vulnerability in Apache Tomcat affecting HTTP/2 connections. Attackers may exploit header reuse to leak data between requests. This article covers technical details, affected versions, impact, and mitigation strategies.

Published: March 11, 2026

CVE-2020-17527 Overview

CVE-2020-17527 is an information leakage vulnerability affecting Apache Tomcat's HTTP/2 implementation. During the investigation of bug 64830, it was discovered that Apache Tomcat could re-use an HTTP request header value from the previous stream received on an HTTP/2 connection for the request associated with a subsequent stream. While this behavior would most likely result in an error and closure of the HTTP/2 connection, it creates a potential for sensitive information to leak between requests from different users sharing the same HTTP/2 connection.

Critical Impact

HTTP request header values from one user's request may be inadvertently applied to another user's subsequent request on a shared HTTP/2 connection, potentially exposing sensitive authentication tokens, session identifiers, or other confidential header data.

Affected Products

  • Apache Tomcat 10.0.0-M1 to 10.0.0-M9
  • Apache Tomcat 9.0.0-M1 to 9.0.39
  • Apache Tomcat 8.5.0 to 8.5.59
  • NetApp Element Plug-in for vCenter Server
  • NetApp OnCommand System Manager
  • Debian Linux 9.0 and 10.0
  • Oracle Blockchain Platform
  • Oracle Communications Cloud Native Core Binding Support Function 1.10.0
  • Oracle Communications Cloud Native Core Policy 1.14.0
  • Oracle Communications Instant Messaging Server 10.0.1.5.0
  • Oracle Instantis EnterpriseTrack 17.1, 17.2, 17.3
  • Oracle MySQL Enterprise Monitor
  • Oracle SD-WAN Edge 9.0
  • Oracle Workload Manager 18c, 19c

Discovery Timeline

  • December 3, 2020 - CVE-2020-17527 published to NVD
  • November 21, 2024 - Last updated in NVD database

Technical Details for CVE-2020-17527

Vulnerability Analysis

The vulnerability resides in Apache Tomcat's HTTP/2 protocol implementation, specifically in how it manages request header state between successive streams on a single connection. HTTP/2 uses multiplexed streams to handle multiple concurrent requests over a single TCP connection, requiring careful state management to ensure data isolation between streams.

In affected versions, the request header recycling mechanism fails to properly clear header values when transitioning between streams. This improper resource reuse means that header data from a completed request stream may persist and be erroneously applied to the next stream's request on the same connection. The vulnerability is classified under CWE-200 (Exposure of Sensitive Information to an Unauthorized Actor).

The network-accessible nature of the vulnerability means any client capable of establishing HTTP/2 connections to an affected Tomcat server could potentially trigger or exploit this condition. While the immediate result is typically a protocol error causing connection termination, race conditions in stream processing could allow header data to be processed before the error is detected.

Root Cause

The root cause stems from improper state management in the HTTP/2 stream handling code. When Apache Tomcat processes HTTP/2 requests, it maintains internal data structures to track header information for each stream. The vulnerability occurs because these data structures are not completely reset when one stream ends and another begins, leading to data contamination between streams. This is a classic example of an improper resource cleanup issue where recycled objects retain stale data from previous operations.

Attack Vector

An attacker could potentially exploit this vulnerability by establishing an HTTP/2 connection to a vulnerable Tomcat server and sending crafted requests designed to maximize the chances of header leakage. The attack scenario is primarily passive in nature—the attacker may receive headers intended for another user who happens to use the same HTTP/2 connection.

In multi-tenant environments or scenarios where a reverse proxy multiplexes multiple users onto shared backend connections, the impact could be more severe. Leaked headers might include Authorization tokens, Cookie values, custom session identifiers, or other sensitive authentication and tracking data.

The typical exploitation flow involves:

  1. Multiple users connecting through an HTTP/2-enabled path to the vulnerable Tomcat server
  2. Rapid stream creation and completion triggering the race condition
  3. Header values from User A's request being applied to User B's subsequent stream
  4. User B potentially receiving error responses containing User A's header information, or User A's headers being logged in association with User B's request

Detection Methods for CVE-2020-17527

Indicators of Compromise

  • Unexpected HTTP error responses on HTTP/2 connections, particularly protocol-level errors indicating malformed requests
  • Application logs showing header values that do not match the expected request context or user session
  • Increased HTTP/2 connection resets (RST_STREAM frames) in network traffic analysis
  • User reports of receiving responses intended for other users or authentication errors on previously valid sessions

Detection Strategies

  • Monitor Tomcat access logs for anomalous header patterns, particularly Authorization or Cookie headers appearing on requests where they shouldn't exist
  • Implement network-level HTTP/2 traffic analysis to detect unusual stream reset patterns or protocol errors
  • Deploy application-layer monitoring to correlate request headers with expected user session data
  • Review Tomcat error logs for StreamException or header-related processing errors in the HTTP/2 upgrade handler

Monitoring Recommendations

  • Enable detailed HTTP/2 debugging in development environments to capture stream-level processing details
  • Configure centralized logging aggregation to correlate HTTP/2 connection events across multiple Tomcat instances
  • Implement runtime application self-protection (RASP) solutions to detect header manipulation anomalies
  • Use SentinelOne Singularity Platform for endpoint and workload protection to identify exploitation attempts and unusual process behavior

How to Mitigate CVE-2020-17527

Immediate Actions Required

  • Upgrade Apache Tomcat immediately: version 10.0.0-M10 or later for the 10.x branch, version 9.0.40 or later for the 9.x branch, and version 8.5.60 or later for the 8.5.x branch
  • If immediate patching is not possible, consider disabling HTTP/2 support temporarily by removing or commenting out the UpgradeProtocol configuration for HTTP/2 in server.xml
  • Review access logs for any signs of information leakage that may have occurred prior to patching
  • Notify security teams and conduct risk assessment for environments where sensitive header data is transmitted

Patch Information

Apache has released patched versions addressing this vulnerability. Organizations should upgrade to the following minimum versions:

  • Apache Tomcat 10.x: Upgrade to 10.0.0-M10 or later
  • Apache Tomcat 9.x: Upgrade to 9.0.40 or later
  • Apache Tomcat 8.5.x: Upgrade to 8.5.60 or later

For detailed patch information, consult the Apache Tomcat Announcement Thread and the Debian Security Advisory DSA-4835. Oracle customers should also review the relevant Oracle CPU April 2021 and subsequent security updates for affected Oracle products.

Workarounds

  • Disable HTTP/2 support by removing the UpgradeProtocol element for org.apache.coyote.http2.Http2Protocol from the Tomcat server.xml configuration
  • Configure reverse proxies to terminate HTTP/2 connections and communicate with Tomcat backends using HTTP/1.1 only
  • Implement network segmentation to limit exposure of vulnerable Tomcat instances to untrusted networks
  • Deploy web application firewalls (WAFs) to monitor and filter HTTP/2 traffic for anomalous patterns
bash
# Disable HTTP/2 in Tomcat server.xml
# Remove or comment out the following line from your Connector configuration:
# <UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" />

# Example secure Connector configuration using HTTP/1.1 only:
# <Connector port="8443" protocol="org.apache.coyote.http11.Http11NioProtocol"
#            maxThreads="150" SSLEnabled="true">
#     <SSLHostConfig>
#         <Certificate certificateKeystoreFile="conf/localhost-rsa.jks"
#                      type="RSA" />
#     </SSLHostConfig>
# </Connector>

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechApache Tomcat

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability10.51%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-200
  • Technical References
  • Openwall Security Mailing List

  • Apache TomEE Commit Discussion

  • Apache TomEE Commit Discussion

  • Apache Tomcat Dev Discussion

  • Apache Tomcat Dev Discussion

  • Apache TomEE Commit Discussion

  • Apache Guacamole Issues Discussion

  • Apache Announcement Thread

  • Apache Tomcat Announcement Thread

  • Apache Tomcat Dev Discussion

  • Apache Guacamole Issues Discussion

  • Apache Tomcat Users Discussion

  • Apache Tomcat Dev Discussion

  • Apache Announcement Thread

  • Apache Tomcat Users Discussion

  • Debian LTS Announcement

  • Gentoo GLSA 202012-23

  • NetApp Security Advisory

  • Debian DSA-4835
  • Vendor Resources
  • Apache Tomcat Announcement Thread

  • Oracle CPU July 2021 Alerts

  • Oracle CPU April 2021 Alerts

  • Oracle CPU April 2022 Alerts

  • Oracle CPU January 2022 Alerts
  • Related CVEs
  • CVE-2026-34487: Apache Tomcat Information Disclosure Flaw

  • CVE-2026-29146: Apache Tomcat Padding Oracle Vulnerability

  • CVE-2023-28708: Apache Tomcat Info Disclosure Vulnerability

  • CVE-2024-21733: Apache Tomcat Information Disclosure Flaw
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English