Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-jgm2-m5cg-f66g

Опубликовано: 17 мая 2022
Источник: github
Github: Прошло ревью

Описание

Authentication Bypass in Apache Tomcat

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.

Ссылки

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 6.0.0, < 6.0.36

6.0.36

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

>= 7.0.0, < 7.0.30

7.0.30

EPSS

Процентиль: 87%
0.03399
Низкий

Дефекты

CWE-287

Связанные уязвимости

ubuntu
больше 12 лет назад

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.

redhat
больше 12 лет назад

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.

nvd
больше 12 лет назад

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.

debian
больше 12 лет назад

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6 ...

oracle-oval
больше 12 лет назад

ELSA-2013-0640: tomcat5 security update (IMPORTANT)

EPSS

Процентиль: 87%
0.03399
Низкий

Дефекты

CWE-287