The SentinelOne Annual Threat Report - A Defenders Guide from the FrontlinesThe SentinelOne Annual Threat ReportGet the Report
Experiencing a Breach?Blog
Get StartedContact Us
SentinelOne
  • Platform
    Platform Overview
    • Singularity Platform
      Welcome to Integrated Enterprise Security
    • AI for Security
      Leading the Way in AI-Powered Security Solutions
    • Securing AI
      Accelerate AI Adoption with Secure AI Tools, Apps, and Agents.
    • How It Works
      The Singularity XDR Difference
    • Singularity Marketplace
      One-Click Integrations to Unlock the Power of XDR
    • Pricing & Packaging
      Comparisons and Guidance at a Glance
    Data & AI
    • Purple AI
      Accelerate SecOps with Generative AI
    • Singularity Hyperautomation
      Easily Automate Security Processes
    • AI-SIEM
      The AI SIEM for the Autonomous SOC
    • AI Data Pipelines
      Security Data Pipeline for AI SIEM and Data Optimization
    • Singularity Data Lake
      AI-Powered, Unified Data Lake
    • Singularity Data Lake for Log Analytics
      Seamlessly Ingest Data from On-Prem, Cloud or Hybrid Environments
    Endpoint Security
    • Singularity Endpoint
      Autonomous Prevention, Detection, and Response
    • Singularity XDR
      Native & Open Protection, Detection, and Response
    • Singularity RemoteOps Forensics
      Orchestrate Forensics at Scale
    • Singularity Threat Intelligence
      Comprehensive Adversary Intelligence
    • Singularity Vulnerability Management
      Application & OS Vulnerability Management
    • Singularity Identity
      Identity Threat Detection and Response
    Cloud Security
    • Singularity Cloud Security
      Block Attacks with an AI-Powered CNAPP
    • Singularity Cloud Native Security
      Secure Cloud and Development Resources
    • Singularity Cloud Workload Security
      Real-Time Cloud Workload Protection Platform
    • Singularity Cloud Data Security
      AI-Powered Threat Detection for Cloud Storage
    • Singularity Cloud Security Posture Management
      Detect and Remediate Cloud Misconfigurations
    Securing AI
    • Prompt Security
      Secure AI Tools Across Your Enterprise
  • Why SentinelOne?
    Why SentinelOne?
    • Why SentinelOne?
      Cybersecurity Built for What’s Next
    • Our Customers
      Trusted by the World’s Leading Enterprises
    • Industry Recognition
      Tested and Proven by the Experts
    • About Us
      The Industry Leader in Autonomous Cybersecurity
    Compare SentinelOne
    • Arctic Wolf
    • Broadcom
    • CrowdStrike
    • Cybereason
    • Microsoft
    • Palo Alto Networks
    • Sophos
    • Splunk
    • Trellix
    • Trend Micro
    • Wiz
    Verticals
    • Energy
    • Federal Government
    • Finance
    • Healthcare
    • Higher Education
    • K-12 Education
    • Manufacturing
    • Retail
    • State and Local Government
  • Services
    Managed Services
    • Managed Services Overview
      Wayfinder Threat Detection & Response
    • Threat Hunting
      World-Class Expertise and Threat Intelligence
    • Managed Detection & Response
      24/7/365 Expert MDR Across Your Entire Environment
    • Incident Readiness & Response
      DFIR, Breach Readiness, & Compromise Assessments
    Support, Deployment, & Health
    • Technical Account Management
      Customer Success with Personalized Service
    • SentinelOne GO
      Guided Onboarding & Deployment Advisory
    • SentinelOne University
      Live and On-Demand Training
    • Services Overview
      Comprehensive Solutions for Seamless Security Operations
    • SentinelOne Community
      Community Login
  • Partners
    Our Network
    • MSSP Partners
      Succeed Faster with SentinelOne
    • Singularity Marketplace
      Extend the Power of S1 Technology
    • Cyber Risk Partners
      Enlist Pro Response and Advisory Teams
    • Technology Alliances
      Integrated, Enterprise-Scale Solutions
    • SentinelOne for AWS
      Hosted in AWS Regions Around the World
    • Channel Partners
      Deliver the Right Solutions, Together
    • SentinelOne for Google Cloud
      Unified, Autonomous Security Giving Defenders the Advantage at Global Scale
    • Partner Locator
      Your Go-to Source for Our Top Partners in Your Region
    Partner Portal→
  • Resources
    Resource Center
    • Case Studies
    • Data Sheets
    • eBooks
    • Reports
    • Videos
    • Webinars
    • Whitepapers
    • Events
    View All Resources→
    Blog
    • Feature Spotlight
    • For CISO/CIO
    • From the Front Lines
    • Identity
    • Cloud
    • macOS
    • SentinelOne Blog
    Blog→
    Tech Resources
    • SentinelLABS
    • Ransomware Anthology
    • Cybersecurity 101
  • About
    About SentinelOne
    • About SentinelOne
      The Industry Leader in Cybersecurity
    • Investor Relations
      Financial Information & Events
    • SentinelLABS
      Threat Research for the Modern Threat Hunter
    • Careers
      The Latest Job Opportunities
    • Press & News
      Company Announcements
    • Cybersecurity Blog
      The Latest Cybersecurity Threats, News, & More
    • FAQ
      Get Answers to Our Most Frequently Asked Questions
    • DataSet
      The Live Data Platform
    • S Foundation
      Securing a Safer Future for All
    • S Ventures
      Investing in the Next Generation of Security, Data and AI
  • Pricing
Get StartedContact Us
CVE Vulnerability Database
Vulnerability Database/CVE-2021-25122

CVE-2021-25122: Apache Tomcat Information Disclosure Flaw

CVE-2021-25122 is an information disclosure vulnerability in Apache Tomcat affecting h2c connections. It allows request data from one user to be exposed to another user. This article covers technical details, affected versions, impact, and mitigation strategies.

Updated: May 16, 2026

CVE-2021-25122 Overview

CVE-2021-25122 is an information disclosure vulnerability in Apache Tomcat affecting how the server handles new HTTP/2 cleartext (h2c) connection requests. When responding to h2c upgrade requests, vulnerable Tomcat versions could duplicate request headers and a limited portion of the request body from one request to another. The result is that user A and user B could both receive the response intended for user A's request, exposing sensitive data such as authentication tokens, session cookies, or personally identifiable information across user sessions. The flaw is classified under CWE-200: Exposure of Sensitive Information to an Unauthorized Actor.

Critical Impact

Cross-request data leakage between unrelated users over h2c connections can expose session cookies, authorization headers, and request bodies to attackers on the network.

Affected Products

  • Apache Tomcat 10.0.0-M1 to 10.0.0
  • Apache Tomcat 9.0.0.M1 to 9.0.41 and 8.5.0 to 8.5.61
  • Debian Linux 9 and 10, plus multiple Oracle products (Agile PLM, Database 12.2/19c/21c, Communications Cloud Native Core Policy, MySQL Enterprise Monitor, Siebel UI Framework, Managed File Transfer, Graph Server and Client, Instantis EnterpriseTrack)

Discovery Timeline

  • 2021-03-01 - Apache Tomcat project publishes advisory on the Openwall oss-security list
  • 2021-03-01 - CVE-2021-25122 published to NVD
  • 2024-11-21 - Last updated in NVD database

Technical Details for CVE-2021-25122

Vulnerability Analysis

The vulnerability resides in Tomcat's HTTP/2 upgrade handling path. HTTP/2 cleartext (h2c) allows a client to upgrade an existing HTTP/1.1 connection to HTTP/2 without TLS by sending an Upgrade: h2c header. During this upgrade transition, Tomcat constructs internal request objects that carry the original request data forward into the HTTP/2 stream. A logic flaw in this handoff allowed request state — specifically headers and a bounded amount of request body content — to be reused across concurrent or subsequent requests served by the same server worker.

The practical impact is a confidentiality breach across user sessions. An attacker sending a crafted h2c upgrade request can receive headers or partial body content originally bound to another user's in-flight request. This data may include Authorization headers, session cookies, X-CSRF-Token values, or sensitive POST payloads. Exploitation requires no authentication and can be performed by any network-reachable client.

Root Cause

The root cause is improper isolation of request-scoped state during the h2c protocol upgrade. Internal buffers holding request headers and body fragments were not consistently cleared or re-initialized between requests handled by the upgraded connection, allowing data from one request context to bleed into another.

Attack Vector

An attacker establishes a network connection to a Tomcat server that has h2c enabled and issues HTTP/1.1 requests with an Upgrade: h2c header. Under concurrent load, the server response stream may include headers and body fragments belonging to other users' requests. Exploitation requires no privileges or user interaction, and the attack vector is network-based against any reachable Tomcat instance with h2c configured.

No public proof-of-concept exploit is available in Exploit-DB or CISA's KEV catalog. See the Apache Tomcat security announcement for technical details.

Detection Methods for CVE-2021-25122

Indicators of Compromise

  • Unexpected Upgrade: h2c or HTTP2-Settings headers in HTTP/1.1 request logs from untrusted clients.
  • Tomcat access logs showing responses with Content-Length or header sizes inconsistent with the matched request URI.
  • User reports of seeing other users' data, session content, or unexpected authentication state in returned pages or API responses.

Detection Strategies

  • Inventory all Tomcat deployments and verify version strings against the affected ranges (8.5.0–8.5.61, 9.0.0.M1–9.0.41, 10.0.0-M1–10.0.0).
  • Inspect the server.xml Connector configuration for UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" entries that enable h2c on non-TLS connectors.
  • Correlate web application firewall logs for anomalous h2c upgrade activity originating from external networks.

Monitoring Recommendations

  • Enable verbose Tomcat access logging with request and response header sizes to identify mismatched payloads.
  • Monitor for spikes in HTTP/1.1-to-HTTP/2 upgrade attempts, particularly from unauthenticated sources.
  • Alert on application-layer errors indicating session or authentication state inconsistencies, which can signal cross-request data exposure.

How to Mitigate CVE-2021-25122

Immediate Actions Required

  • Upgrade Apache Tomcat to a fixed version: 10.0.2 or later, 9.0.43 or later, or 8.5.63 or later.
  • For Debian-based systems, apply updates from DSA-4891 and the Debian LTS announcement.
  • For Oracle products bundling Tomcat, apply the Oracle Critical Patch Update July 2021, October 2021, or January 2022 advisories.

Patch Information

The Apache Tomcat project released fixed builds shortly after disclosure. Administrators should consult the official Tomcat announcement thread and the NetApp security advisory NTAP-20210409-0002 for bundled product guidance. Gentoo users should refer to GLSA 202208-34.

Workarounds

  • Disable the HTTP/2 upgrade protocol on cleartext connectors by removing the UpgradeProtocol element from server.xml until patching is complete.
  • Terminate TLS at an upstream reverse proxy or load balancer and restrict Tomcat connectors to HTTP/1.1 only when h2c is not required.
  • Restrict network exposure of Tomcat connectors to trusted internal networks while remediation is in progress.
bash
# Configuration example: remove h2c UpgradeProtocol from Tomcat server.xml
# Edit $CATALINA_BASE/conf/server.xml and comment out or delete the h2c upgrade entry:
#
# <Connector port="8080" protocol="HTTP/1.1"
#            connectionTimeout="20000"
#            redirectPort="8443">
#     <!-- <UpgradeProtocol className="org.apache.coyote.http2.Http2Protocol" /> -->
# </Connector>

# Verify the running Tomcat version
$CATALINA_HOME/bin/version.sh | grep "Server version"

# Restart Tomcat after applying changes
systemctl restart tomcat

Disclaimer: This content was generated using AI. While we strive for accuracy, please verify critical information with official sources.

  • Vulnerability Details
  • TypeInformation Disclosure

  • Vendor/TechApache Tomcat

  • SeverityHIGH

  • CVSS Score7.5

  • EPSS Probability2.56%

  • Known ExploitedNo
  • CVSS Vector
  • CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
  • Impact Assessment
  • ConfidentialityLow
  • IntegrityNone
  • AvailabilityNone
  • CWE References
  • CWE-200
  • Technical References
  • Openwall Security List Post

  • Apache Announce Thread

  • Apache Tomcat Dev Thread

  • Apache Tomcat Users Thread

  • Apache Tomcat Users Thread

  • Apache Tomcat Users Thread

  • Apache Tomcat Dev Discussion

  • Debian LTS Announcement

  • Gentoo GLSA 2022-34

  • NetApp Security Advisory

  • Debian Security Advisory DSA-4891
  • Vendor Resources
  • Apache Tomcat Announce

  • Oracle CPU July 2021 Alert

  • Oracle CPU January 2022 Alert

  • Oracle CPU October 2021 Alert
  • Related CVEs
  • CVE-2026-42498: Apache Tomcat Information Disclosure Flaw

  • CVE-2026-43514: Apache Tomcat Timing Attack Vulnerability

  • CVE-2026-34487: Apache Tomcat Information Disclosure Flaw

  • CVE-2026-29146: Apache Tomcat Padding Oracle Vulnerability
Default Legacy - Prefooter | Experience the World’s Most Advanced Cybersecurity Platform

Experience the World’s Most Advanced Cybersecurity Platform

See how our intelligent, autonomous cybersecurity platform can protect your organization now and into the future.

Try SentinelOne
  • Get Started
  • Get a Demo
  • Product Tour
  • Why SentinelOne
  • Pricing & Packaging
  • FAQ
  • Contact
  • Contact Us
  • Customer Support
  • SentinelOne Status
  • Language
  • Platform
  • Singularity Platform
  • Singularity Endpoint
  • Singularity Cloud
  • Singularity AI-SIEM
  • Singularity Identity
  • Singularity Marketplace
  • Purple AI
  • Services
  • Wayfinder TDR
  • SentinelOne GO
  • Technical Account Management
  • Support Services
  • Verticals
  • Energy
  • Federal Government
  • Finance
  • Healthcare
  • Higher Education
  • K-12 Education
  • Manufacturing
  • Retail
  • State and Local Government
  • Cybersecurity for SMB
  • Resources
  • Blog
  • Labs
  • Case Studies
  • Videos
  • Product Tours
  • Events
  • Cybersecurity 101
  • eBooks
  • Webinars
  • Whitepapers
  • Press
  • News
  • Ransomware Anthology
  • Company
  • About Us
  • Our Customers
  • Careers
  • Partners
  • Legal & Compliance
  • Security & Compliance
  • Investor Relations
  • S Foundation
  • S Ventures

©2026 SentinelOne, All Rights Reserved.

Privacy Notice Terms of Use

English