Legacy Knowledge Base
Published Jul. 2, 2025

Resolution of HTTP Request Smuggling vulnerability

Written By

Anishq Sharma

How To articles are not official guidelines or officially supporteddocumentation. They are community-contributed content and may not alwaysreflect the latest updates to Liferay DXP. We welcome your feedback toimprove How to articles!

While we make every effort to ensure this Knowledge Base is accurate, itmay not always reflect the most recent updates or official guidelines.We appreciate your understanding and encourage you to reach out with anyfeedback or concerns.

Legacy Article

You are viewing an article from our legacy "FastTrack"publication program, made available for informational purposes. Articlesin this program were published without a requirement for independentediting or verification and are provided "as is" withoutguarantee.

Before using any information from this article, independently verify itssuitability for your situation and project.

Issue

  • Security vulnerability of HTTP Request Smuggling in the environment.

Environment

  • Liferay DXP 7.0
  • Liferay DXP 7.1
  • Liferay DXP 7.2

Resolution

  • 'HTTP request smuggling' should be handled at the web server/app server and not at Liferay.
  • For example, if user is using Tomcat, then they should upgrade to a newer version where the vulnerability is fixed.
  • Tomcat Affected versions:
    • Apache Tomcat 9.0.28 to 9.0.30
    • Apache Tomcat 8.5.48 to 8.5.50
    • Apache Tomcat 7.0.98 to 7.0.99
  • Mitigation:
    • Upgrade to Apache Tomcat 9.0.31 or later
    • Upgrade to Apache Tomcat 8.5.51 or later
    • Upgrade to Apache Tomcat 7.0.100 or later

Additional Information

 

Did this article resolve your issue ?

Legacy Knowledge Base