Описание
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat JBoss BRMS 5 | jbossweb | Affected | ||
Red Hat JBoss Data Grid 6 | jbossweb | Affected | ||
Red Hat JBoss Enterprise Web Server 2 | tomcat7 | Not affected | ||
Red Hat JBoss Operations Network 3.1 | jbossweb | Not affected | ||
Red Hat JBoss Portal 5 | jbossweb | Will not fix | ||
Red Hat JBoss SOA Platform 5 | jbossweb | Affected | ||
JBEWP 5 for RHEL 5 | jbossweb | Fixed | RHSA-2013:0631 | 11.03.2013 |
JBEWP 5 for RHEL 6 | jbossweb | Fixed | RHSA-2013:0631 | 11.03.2013 |
JBoss Data Grid 6.1 | Fixed | RHSA-2013:0665 | 20.03.2013 | |
JBoss Enterprise BRMS Platform 5.3 | Fixed | RHSA-2013:1006 | 01.07.2013 |
Показывать по
Дополнительная информация
Статус:
5 Medium
CVSS2
Связанные уязвимости
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
The HTTP Digest Access Authentication implementation in Apache Tomcat ...
5 Medium
CVSS2