Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2012-5886

Опубликовано: 17 нояб. 2012
Источник: debian
EPSS Низкий

Описание

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat6fixed6.0.35-5+nmu1package
tomcat6fixed6.0.35-1+squeeze3squeezepackage
tomcat7fixed7.0.28-3+nmu1package

Примечания

  • DSA 2725

EPSS

Процентиль: 76%
0.01018
Низкий

Связанные уязвимости

ubuntu
больше 12 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.

redhat
больше 12 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.

nvd
больше 12 лет назад

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.

github
около 3 лет назад

Improper Authentication in Apache Tomcat

oracle-oval
больше 12 лет назад

ELSA-2013-0640: tomcat5 security update (IMPORTANT)

EPSS

Процентиль: 76%
0.01018
Низкий