Improper Access Control in Apache Tomcat
Moderate severity
GitHub Reviewed
Published
May 17, 2022
to the GitHub Advisory Database
•
Updated Jan 27, 2023
Package
Affected versions
>= 5.5.0, < 5.5.36
>= 6.0.0, < 6.0.36
>= 7.0.0, < 7.0.30
Patched versions
5.5.36
6.0.36
7.0.30
Description
Published by the National Vulnerability Database
Nov 17, 2012
Published to the GitHub Advisory Database
May 17, 2022
Reviewed
Jul 12, 2022
Last updated
Jan 27, 2023
The replay-countermeasure functionality in the HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 tracks cnonce (aka client nonce) values instead of nonce (aka server nonce) and nc (aka nonce-count) values, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests, a different vulnerability than CVE-2011-1184.
References