Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c38m-v4m2-524v

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью

Описание

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Ссылки

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 7.0.0, <= 7.0.20

7.0.21

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 6.0.0, <= 6.0.33

6.0.34

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 5.0.0, <= 5.5.33

5.5.34

EPSS

Процентиль: 73%
0.00812
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
около 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

redhat
около 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

nvd
около 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

debian
около 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 ...

oracle-oval
почти 14 лет назад

ELSA-2011-1780: tomcat6 security and bug fix update (MODERATE)

EPSS

Процентиль: 73%
0.00812
Низкий

Дефекты

CWE-287