Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-c38m-v4m2-524v

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью

Описание

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Ссылки

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 7.0.0, <= 7.0.20

7.0.21

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 6.0.0, <= 6.0.33

6.0.34

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 5.0.0, <= 5.5.33

5.5.34

EPSS

Процентиль: 74%
0.00872
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

redhat
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

nvd
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

debian
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 ...

oracle-oval
больше 13 лет назад

ELSA-2011-1780: tomcat6 security and bug fix update (MODERATE)

EPSS

Процентиль: 74%
0.00872
Низкий

Дефекты

CWE-287