Lucene search

K
githubGitHub Advisory DatabaseGHSA-C38M-V4M2-524V
HistoryMay 14, 2022 - 1:17 a.m.

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

2022-05-1401:17:02
CWE-287
GitHub Advisory Database
github.com
13
remote attack
spoofing
ajp protocol
authentication bypass
sensitive information
vulnerability
apache tomcat

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.5

Confidence

Low

EPSS

0.012

Percentile

85.4%

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Affected configurations

Vulners
Node
org.apache.tomcattomcatRange5.0.05.5.33
OR
org.apache.tomcattomcatRange6.0.06.0.33
OR
org.apache.tomcattomcatRange7.0.07.0.20
VendorProductVersionCPE
org.apache.tomcattomcat*cpe:2.3:a:org.apache.tomcat:tomcat:*:*:*:*:*:*:*:*

References

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

AI Score

6.5

Confidence

Low

EPSS

0.012

Percentile

85.4%