Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-3190

Опубликовано: 31 авг. 2011
Источник: debian

Описание

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat6fixed6.0.35-1package
tomcat7fixed7.0.21-1package
tomcat5.5removedpackage

Связанные уязвимости

ubuntu
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

redhat
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

nvd
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

github
около 3 лет назад

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

oracle-oval
больше 13 лет назад

ELSA-2011-1780: tomcat6 security and bug fix update (MODERATE)