Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

github логотип

GHSA-p26v-97vp-jcx6

Опубликовано: 14 мая 2022
Источник: github
Github: Прошло ревью

Описание

Access controll bypass in Apache Tomcat

Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011-1419.

Пакеты

Наименование

org.apache.tomcat:tomcat

maven
Затронутые версииВерсия исправления

= 7.0.11

7.0.12

EPSS

Процентиль: 71%
0.0072
Низкий

Связанные уязвимости

ubuntu
около 14 лет назад

Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011-1419.

redhat
больше 14 лет назад

Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011-1419.

nvd
около 14 лет назад

Apache Tomcat 7.0.11, when web.xml has no login configuration, does not follow security constraints, which allows remote attackers to bypass intended access restrictions via HTTP requests to a meta-data complete web application. NOTE: this vulnerability exists because of an incorrect fix for CVE-2011-1088 and CVE-2011-1419.

debian
около 14 лет назад

Apache Tomcat 7.0.11, when web.xml has no login configuration, does no ...

EPSS

Процентиль: 71%
0.0072
Низкий