Description
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
No analysis available yet.
Remediation
No remediation available yet.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-2733-1 | tomcat8 security update |
Debian DSA |
DSA-4952-1 | tomcat9 security update |
Debian DSA |
DSA-4984-1 | tomcat9 security update |
EUVD |
EUVD-2021-1533 | A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. |
Github GHSA |
GHSA-36qh-35cm-5w2w | Authentication Bypass by Alternate Name in Apache Tomcat |
Ubuntu USN |
USN-5360-1 | Tomcat vulnerabilities |
References
History
No history.
Subscriptions
Apache
Subscribe
Tomcat
Subscribe
Debian
Subscribe
Debian Linux
Subscribe
Oracle
Subscribe
Communications Cloud Native Core Policy
Subscribe
Communications Diameter Signaling Router
Subscribe
Communications Pricing Design Center
Subscribe
Hospitality Cruise Shipboard Property Management System
Subscribe
Tekelec Platform Distribution
Subscribe
Redhat
Subscribe
Jboss Enterprise Web Server
Subscribe
Jboss Fuse
Subscribe
Openshift Application Runtimes
Subscribe
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2024-08-03T22:40:31.832Z
Reserved: 2021-04-13T00:00:00.000Z
Link: CVE-2021-30640
No data.
Status : Modified
Published: 2021-07-12T15:15:08.367
Modified: 2024-11-21T06:04:20.893
Link: CVE-2021-30640
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN