Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2401-1 | tomcat6 security update |
EUVD |
EUVD-2022-3486 | Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request. |
Github GHSA |
GHSA-c38m-v4m2-524v | Apache Tomcat Allows Remote Attackers to Spoof AJP Requests |
Ubuntu USN |
USN-1252-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-06T23:29:55.291Z
Reserved: 2011-08-19T00:00:00
Link: CVE-2011-3190
No data.
Status : Deferred
Published: 2011-08-31T23:55:03.550
Modified: 2025-04-11T00:51:21.963
Link: CVE-2011-3190
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA
Ubuntu USN