Lucene search

K
githubGitHub Advisory DatabaseGHSA-9XRJ-439H-62HG
HistoryMay 17, 2022 - 1:38 a.m.

Improper Authentication in Apache Tomcat

2022-05-1701:38:30
CWE-287
GitHub Advisory Database
github.com
19
apache tomcat
authentication
remote attackers
session id

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

71.6%

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.

Affected configurations

Vulners
Node
org.apache.tomcattomcat-catalinaRange7.0.07.0.30
OR
org.apache.tomcattomcat-catalinaRange6.0.06.0.36
OR
org.apache.tomcattomcat-catalinaRange5.5.05.5.36
VendorProductVersionCPE
org.apache.tomcattomcat-catalina*cpe:2.3:a:org.apache.tomcat:tomcat-catalina:*:*:*:*:*:*:*:*

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

71.6%