Lucene search

K
githubGitHub Advisory DatabaseGHSA-JGM2-M5CG-F66G
HistoryMay 17, 2022 - 12:59 a.m.

Authentication Bypass in Apache Tomcat

2022-05-1700:59:04
CWE-287
GitHub Advisory Database
github.com
17
apache tomcat
authentication
security-constraint

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

69.2%

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x before 6.0.36 and 7.x before 7.0.30, when FORM authentication is used, allows remote attackers to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.

Affected configurations

Vulners
Node
org.apache.tomcattomcatRange7.0.0โ€“7.0.30
OR
org.apache.tomcattomcatRange6.0.0โ€“6.0.36
VendorProductVersionCPE
org.apache.tomcattomcat*cpe:2.3:a:org.apache.tomcat:tomcat:*:*:*:*:*:*:*:*

References

CVSS2

4.3

Attack Vector

NETWORK

Attack Complexity

MEDIUM

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:M/Au:N/C:N/I:P/A:N

EPSS

0.003

Percentile

69.2%