The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
Metrics
Affected Vendors & Products
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2725-1 | tomcat6 security update |
EUVD |
EUVD-2022-1939 | The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests. |
Github GHSA |
GHSA-28cq-6rmx-pjq4 | Improper Authentication in Apache Tomcat |
Ubuntu USN |
USN-1637-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
Thu, 30 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:* |
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: mitre
Published:
Updated: 2024-08-06T21:21:27.681Z
Reserved: 2012-11-17T00:00:00
Link: CVE-2012-5887
No data.
Status : Analyzed
Published: 2012-11-17T19:55:02.813
Modified: 2025-10-30T15:49:33.063
Link: CVE-2012-5887
OpenCVE Enrichment
No data.
Debian DSA
EUVD
Github GHSA
Ubuntu USN