Lucene search

K
cveRedhatCVE-2011-3190
HistoryAug 31, 2011 - 11:55 p.m.

CVE-2011-3190

2011-08-3123:55:03
CWE-264
redhat
web.nvd.nist.gov
131
cve-2011-3190
ajp protocol
apache tomcat
remote attackers
authentication bypass
sensitive information

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

5.3

Confidence

Low

EPSS

0.012

Percentile

85.4%

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Affected configurations

Nvd
Node
apachetomcatMatch7.0.0
OR
apachetomcatMatch7.0.0beta
OR
apachetomcatMatch7.0.1
OR
apachetomcatMatch7.0.2
OR
apachetomcatMatch7.0.3
OR
apachetomcatMatch7.0.4
OR
apachetomcatMatch7.0.5
OR
apachetomcatMatch7.0.6
OR
apachetomcatMatch7.0.7
OR
apachetomcatMatch7.0.8
OR
apachetomcatMatch7.0.9
OR
apachetomcatMatch7.0.10
OR
apachetomcatMatch7.0.11
OR
apachetomcatMatch7.0.12
OR
apachetomcatMatch7.0.13
OR
apachetomcatMatch7.0.14
OR
apachetomcatMatch7.0.16
OR
apachetomcatMatch7.0.17
OR
apachetomcatMatch7.0.19
OR
apachetomcatMatch7.0.20
Node
apachetomcatMatch6.0
OR
apachetomcatMatch6.0.0
OR
apachetomcatMatch6.0.1
OR
apachetomcatMatch6.0.2
OR
apachetomcatMatch6.0.3
OR
apachetomcatMatch6.0.4
OR
apachetomcatMatch6.0.5
OR
apachetomcatMatch6.0.6
OR
apachetomcatMatch6.0.7
OR
apachetomcatMatch6.0.8
OR
apachetomcatMatch6.0.9
OR
apachetomcatMatch6.0.10
OR
apachetomcatMatch6.0.11
OR
apachetomcatMatch6.0.12
OR
apachetomcatMatch6.0.13
OR
apachetomcatMatch6.0.14
OR
apachetomcatMatch6.0.15
OR
apachetomcatMatch6.0.16
OR
apachetomcatMatch6.0.17
OR
apachetomcatMatch6.0.18
OR
apachetomcatMatch6.0.19
OR
apachetomcatMatch6.0.20
OR
apachetomcatMatch6.0.24
OR
apachetomcatMatch6.0.26
OR
apachetomcatMatch6.0.27
OR
apachetomcatMatch6.0.28
OR
apachetomcatMatch6.0.29
OR
apachetomcatMatch6.0.30
OR
apachetomcatMatch6.0.31
OR
apachetomcatMatch6.0.32
OR
apachetomcatMatch6.0.33
Node
apachetomcatMatch5.5.0
OR
apachetomcatMatch5.5.1
OR
apachetomcatMatch5.5.2
OR
apachetomcatMatch5.5.3
OR
apachetomcatMatch5.5.4
OR
apachetomcatMatch5.5.5
OR
apachetomcatMatch5.5.6
OR
apachetomcatMatch5.5.7
OR
apachetomcatMatch5.5.8
OR
apachetomcatMatch5.5.9
OR
apachetomcatMatch5.5.10
OR
apachetomcatMatch5.5.11
OR
apachetomcatMatch5.5.12
OR
apachetomcatMatch5.5.13
OR
apachetomcatMatch5.5.14
OR
apachetomcatMatch5.5.15
OR
apachetomcatMatch5.5.16
OR
apachetomcatMatch5.5.17
OR
apachetomcatMatch5.5.18
OR
apachetomcatMatch5.5.19
OR
apachetomcatMatch5.5.20
OR
apachetomcatMatch5.5.21
OR
apachetomcatMatch5.5.22
OR
apachetomcatMatch5.5.23
OR
apachetomcatMatch5.5.24
OR
apachetomcatMatch5.5.25
OR
apachetomcatMatch5.5.26
OR
apachetomcatMatch5.5.27
OR
apachetomcatMatch5.5.28
OR
apachetomcatMatch5.5.29
OR
apachetomcatMatch5.5.30
OR
apachetomcatMatch5.5.31
OR
apachetomcatMatch5.5.32
OR
apachetomcatMatch5.5.33
VendorProductVersionCPE
apachetomcat7.0.0cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
apachetomcat7.0.0cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
apachetomcat7.0.1cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
apachetomcat7.0.2cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
apachetomcat7.0.3cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
apachetomcat7.0.4cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
apachetomcat7.0.5cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
apachetomcat7.0.6cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
apachetomcat7.0.7cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
apachetomcat7.0.8cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
Rows per page:
1-10 of 851

References

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

5.3

Confidence

Low

EPSS

0.012

Percentile

85.4%