Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2011-3190

Опубликовано: 20 авг. 2011
Источник: redhat
CVSS2: 5.8
EPSS Низкий

Описание

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Certificate System 7.2OtherNot affected
Red Hat Certificate System 7.3OtherNot affected
Red Hat Developer Suite v.3PlatformNot affected
Red Hat Enterprise Linux 5tomcat5Not affected
Red Hat Satellite 5.3ServerNot affected
Red Hat Satellite 5.4ServerNot affected
Red Hat Enterprise Linux 6tomcat6FixedRHSA-2011:178005.12.2011
Red Hat JBoss Enterprise Web Server 1 for RHEL 5tomcat5FixedRHSA-2012:068021.05.2012
Red Hat JBoss Enterprise Web Server 1 for RHEL 5tomcat6FixedRHSA-2012:068221.05.2012
Red Hat JBoss Enterprise Web Server 1 for RHEL 6tomcat5FixedRHSA-2012:068021.05.2012

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=734868tomcat: authentication bypass and information disclosure

EPSS

Процентиль: 74%
0.00872
Низкий

5.8 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

nvd
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

debian
почти 14 лет назад

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 ...

github
около 3 лет назад

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

oracle-oval
больше 13 лет назад

ELSA-2011-1780: tomcat6 security and bug fix update (MODERATE)

EPSS

Процентиль: 74%
0.00872
Низкий

5.8 Medium

CVSS2