Описание
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat JBoss BRMS 5 | jbossweb | Affected | ||
Red Hat JBoss Data Grid 6 | jbossweb | Affected | ||
Red Hat JBoss Enterprise Web Server 2 | tomcat7 | Not affected | ||
Red Hat JBoss Operations Network 3.1 | jbossweb | Not affected | ||
Red Hat JBoss Portal 5 | jbossweb | Will not fix | ||
Red Hat JBoss SOA Platform 5 | jbossweb | Affected | ||
JBEWP 5 for RHEL 5 | jbossweb | Fixed | RHSA-2013:0631 | 11.03.2013 |
JBEWP 5 for RHEL 6 | jbossweb | Fixed | RHSA-2013:0631 | 11.03.2013 |
JBoss Data Grid 6.1 | Fixed | RHSA-2013:0665 | 20.03.2013 | |
JBoss Enterprise BRMS Platform 5.3 | Fixed | RHSA-2013:1006 | 01.07.2013 |
Показывать по
Дополнительная информация
Статус:
5 Medium
CVSS2
Связанные уязвимости
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
The HTTP Digest Access Authentication implementation in Apache Tomcat ...
5 Medium
CVSS2