{
"$type": "site.standard.document",
"bskyPostRef": {
"cid": "bafyreigycqh5aefd42noqmenaz2wqvjxf5yihz3y24mndty7nnlivw6pzq",
"uri": "at://did:plc:6wtxqaikjf62unmnajbfbq5v/app.bsky.feed.post/3mfg5zs4xyvp2"
},
"coverImage": {
"$type": "blob",
"ref": {
"$link": "bafkreigcc6vrzvcxt6omrrh625hzrxh43b2xfmwa3zxssndh3xltqub2qa"
},
"mimeType": "image/jpeg",
"size": 72977
},
"path": "/critical-apache-tomcat-cve-2026-24733-enables-security-constraint-bypass-via-http-0-9/",
"publishedAt": "2026-02-21T18:58:55.000Z",
"site": "https://vpncentral.com",
"tags": [
"News",
"Critical Apache Tomcat CVE-2026-24733 Enables Security Constraint Bypass via HTTP/0.9",
"VPN Central"
],
"textContent": "Apache Tomcat patched CVE-2026-24733, a security constraint bypass vulnerability. Attackers use HTTP/0.9 requests to evade access controls. The flaw rated Low severity affects specific configurations. Tomcat accepts HTTP/0.9 HEAD requests when GET should block. HTTP/0.9 predates modern methods. It lacks headers and supports only GET normally. Tomcat processes HEAD over HTTP/0.9 without restriction. This bypasses […]\n\nThe post Critical Apache Tomcat CVE-2026-24733 Enables Security Constraint Bypass via HTTP/0.9 appeared first on VPN Central.",
"title": "Critical Apache Tomcat CVE-2026-24733 Enables Security Constraint Bypass via HTTP/0.9"
}