Critical Apache Tomcat CVE-2026-24733 Enables Security Constraint Bypass via HTTP/0.9


Apache Tomcat patched CVE-2026-24733, a security constraint bypass vulnerability. Attackers use HTTP/0.9 requests to evade access controls. The flaw rated Low severity affects specific configurations. Tomcat accepts HTTP/0.9 HEAD requests when GET should block.

HTTP/0.9 predates modern methods. It lacks headers and supports only GET normally. Tomcat processes HEAD over HTTP/0.9 without restriction. This bypasses rules allowing HEAD but denying GET on protected URIs. Attackers retrieve blocked content.

The Apache team found and fixed the issue. Advisory published February 17, 2026. No exploitation reported yet. Legacy clients or misconfigured proxies enable attack paths. Most modern setups normalize protocols safely.

Affected Versions Table

Tomcat BranchVulnerable RangeFixed Version
11.011.0.0-M1 to 11.0.1411.0.15+
10.110.1.0-M1 to 10.1.4910.1.50+
9.09.0.0.M1 to 9.0.1129.0.113+
EOL BranchesAll versionsMigrate

Upgrade stops bypass immediately.

Attack Requirements

Exploitation needs specific conditions:

  • Security constraint allows HEAD, denies GET for URI.
  • Attacker reaches Tomcat directly or via permissive proxy.
  • HTTP/0.9 traffic accepted end-to-end.
  • No protocol normalization by intermediaries.

Rare but works in legacy setups.

Technical Root Cause

Tomcat code handles HTTP/0.9 specially:

if (protocol == HTTP_0_9) {
// Minimal parsing, no method validation
method = "GET"; // Default assumption
}

HEAD request over 0.9 bypasses GET checks. Constraint evaluation skips body retrieval logic.

Risk Scenarios

Legacy systems face highest exposure:

  • Embedded devices with old Tomcat.
  • Proxies allowing HTTP/0.9 passthrough.
  • Custom clients using obsolete protocol.
  • Misconfigured cloud load balancers.

Modern HTTP/2 stacks block 0.9 naturally.

Mitigation Beyond Patching

Immediate hardening steps:

  • Block HTTP/0.9 at edge firewalls/proxies.
  • Review HEAD vs GET constraints for gaps.
  • Force HTTP/1.1 minimum in server.xml.
  • Log and alert HTTP/0.9 requests.

Validate reverse proxy protocol enforcement.

Constraint Configuration Check

Audit web.xml for risky patterns:

<security-constraint>
<web-resource-collection>
<web-resource-name>Protected</web-resource-name>
<http-method>HEAD</http-method>
<!-- Missing GET deny creates gap -->
</web-resource-collection>
</security-constraint>

Explicitly deny HEAD if unintended.

Patch Deployment Priority

EnvironmentPriorityNotes
ProductionCriticalUpgrade within 7 days
StagingHighTest patches immediately
DevelopmentMediumUpdate before prod deploy
EOL VersionsCriticalMigrate now

Container images need rebuilds.

FAQ

What triggers CVE-2026-24733 in Apache Tomcat?

HTTP/0.9 HEAD requests bypass GET-denied constraints.

Which Tomcat versions fix the vulnerability?

11.0.15+, 10.1.50+, 9.0.113+.

Does HTTP/2 protect against this flaw?

Yes. Modern protocols reject HTTP/0.9 traffic.

Is active exploitation reported?

No confirmed attacks as of February 22, 2026.

What configurations risk exposure?

HEAD allowed, GET denied on same URI path.

How does HTTP/0.9 enable the bypass?

Tomcat assumes GET method, skips full validation.

Readers help support VPNCentral. We may get a commission if you buy through our links. Tooltip Icon

Read our disclosure page to find out how can you help VPNCentral sustain the editorial team Read more

User forum

0 messages