Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

ubuntu логотип

CVE-2009-0580

Опубликовано: 05 июн. 2009
Источник: ubuntu
Приоритет: low
EPSS Высокий
CVSS2: 4.3

Описание

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.

РелизСтатусПримечание
dapper

ignored

end of life
devel

DNE

hardy

DNE

intrepid

DNE

jaunty

DNE

karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

DNE

hardy

ignored

end of life
intrepid

ignored

end of life, was needed
jaunty

ignored

end of life
karmic

DNE

lucid

DNE

maverick

DNE

natty

DNE

oneiric

DNE

Показывать по

РелизСтатусПримечание
dapper

DNE

devel

not-affected

6.0.20-1ubuntu1
hardy

DNE

intrepid

released

6.0.18-0ubuntu3.2
jaunty

released

6.0.18-0ubuntu6.1
karmic

not-affected

6.0.20-1ubuntu1
lucid

not-affected

6.0.20-1ubuntu1
maverick

not-affected

6.0.20-1ubuntu1
natty

not-affected

6.0.20-1ubuntu1
oneiric

not-affected

6.0.20-1ubuntu1

Показывать по

EPSS

Процентиль: 99%
0.88708
Высокий

4.3 Medium

CVSS2

Связанные уязвимости

redhat
около 16 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.

nvd
около 16 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.

debian
около 16 лет назад

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 th ...

github
около 3 лет назад

Exposure of Sensitive Information in Apache Tomcat

oracle-oval
почти 16 лет назад

ELSA-2009-1164: tomcat security update (IMPORTANT)

EPSS

Процентиль: 99%
0.88708
Высокий

4.3 Medium

CVSS2