A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-2733-1 | tomcat8 security update |
![]() |
DSA-4952-1 | tomcat9 security update |
![]() |
EUVD-2021-1533 | A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. |
![]() |
GHSA-36qh-35cm-5w2w | Authentication Bypass by Alternate Name in Apache Tomcat |
![]() |
USN-5360-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T22:40:31.832Z
Reserved: 2021-04-13T00:00:00
Link: CVE-2021-30640

No data.

Status : Modified
Published: 2021-07-12T15:15:08.367
Modified: 2024-11-21T06:04:20.893
Link: CVE-2021-30640


No data.