Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2011-08-31T23:00:00
Updated: 2024-08-06T23:29:55.291Z
Reserved: 2011-08-19T00:00:00
Link: CVE-2011-3190
Vulnrichment
No data.
NVD
Status : Modified
Published: 2011-08-31T23:55:03.550
Modified: 2024-11-21T01:29:56.457
Link: CVE-2011-3190
Redhat