Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2011-3190

Опубликовано: 31 авг. 2011
Источник: debian
EPSS Низкий

Описание

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat6fixed6.0.35-1package
tomcat7fixed7.0.21-1package
tomcat5.5removedpackage

EPSS

Процентиль: 74%
0.00812
Низкий

Связанные уязвимости

ubuntu
больше 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

redhat
больше 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

nvd
больше 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

github
больше 3 лет назад

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

oracle-oval
около 14 лет назад

ELSA-2011-1780: tomcat6 security and bug fix update (MODERATE)

EPSS

Процентиль: 74%
0.00812
Низкий