CVE-2011-3190

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

Published at
2011-08-31T23:55Z
4628 days ago
Modified
2019-03-25T11:33Z
1866 days ago
CWE-264
Problem type

References


URLType
49353
http://www.securityfocus.com/bid/49353
BID
issues.apache.org
https://issues.apache.org/bugzilla/show_bug.cgi?id=51698
MISC
45748
http://secunia.com/advisories/45748
SECUNIA
1025993
http://www.securitytracker.com/id?1025993
SECTRACK
8362
http://securityreason.com/securityalert/8362
SREASON
MDVSA-2011:156
http://www.mandriva.com/security/advisories?name=MDVSA-2011:156
MANDRIVA
DSA-2401
http://www.debian.org/security/2012/dsa-2401
DEBIAN
49094
http://secunia.com/advisories/49094
SECUNIA
SSRT100627
http://marc.info/?l=bugtraq&m=132215163318824&w=2
HP
HPSBUX02860
http://marc.info/?l=bugtraq&m=136485229118404&w=2
HP
HPSBST02955
http://marc.info/?l=bugtraq&m=139344343412337&w=2
HP
57126
http://secunia.com/advisories/57126
SECUNIA
HPSBOV02762
http://marc.info/?l=bugtraq&m=133469267822771&w=2
HP
tomcat-ajp-security-bypass(69472)
https://exchange.xforce.ibmcloud.com/vulnerabilities/69472
XF
oval:org.mitre.oval:def:19465
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19465
OVAL
oval:org.mitre.oval:def:14933
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14933
OVAL
48308
http://secunia.com/advisories/48308
SECUNIA
20110829 [SECURITY] CVE-2011-3190 Apache Tomcat Authentication bypass and information disclosure
http://www.securityfocus.com/archive/1/519466/100/0/threaded
BUGTRAQ
[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E
MLIST
[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E
MLIST
[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E
MLIST
[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E
MLIST

GET https://vulnerabilitydata.com/api/details/CVE-2011-3190

{
	"id": "CVE-2011-3190",
	"published_date": "2011-08-31T23:55Z",
	"last_modified_date": "2019-03-25T11:33Z",
	"assigner": "secalert@redhat.com",
	"description": "Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.",
	"references": [
		{
			"url": "http://www.securityfocus.com/bid/49353",
			"name": "49353",
			"refsource": "BID",
			"tags": []
		},
		{
			"url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51698",
			"name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51698",
			"refsource": "MISC",
			"tags": [
				"Exploit"
			]
		},
		{
			"url": "http://secunia.com/advisories/45748",
			"name": "45748",
			"refsource": "SECUNIA",
			"tags": [
				"Vendor Advisory"
			]
		},
		{
			"url": "http://www.securitytracker.com/id?1025993",
			"name": "1025993",
			"refsource": "SECTRACK",
			"tags": []
		},
		{
			"url": "http://securityreason.com/securityalert/8362",
			"name": "8362",
			"refsource": "SREASON",
			"tags": []
		},
		{
			"url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:156",
			"name": "MDVSA-2011:156",
			"refsource": "MANDRIVA",
			"tags": []
		},
		{
			"url": "http://www.debian.org/security/2012/dsa-2401",
			"name": "DSA-2401",
			"refsource": "DEBIAN",
			"tags": []
		},
		{
			"url": "http://secunia.com/advisories/49094",
			"name": "49094",
			"refsource": "SECUNIA",
			"tags": []
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=132215163318824&w=2",
			"name": "SSRT100627",
			"refsource": "HP",
			"tags": []
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2",
			"name": "HPSBUX02860",
			"refsource": "HP",
			"tags": []
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2",
			"name": "HPSBST02955",
			"refsource": "HP",
			"tags": []
		},
		{
			"url": "http://secunia.com/advisories/57126",
			"name": "57126",
			"refsource": "SECUNIA",
			"tags": []
		},
		{
			"url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2",
			"name": "HPSBOV02762",
			"refsource": "HP",
			"tags": []
		},
		{
			"url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69472",
			"name": "tomcat-ajp-security-bypass(69472)",
			"refsource": "XF",
			"tags": []
		},
		{
			"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19465",
			"name": "oval:org.mitre.oval:def:19465",
			"refsource": "OVAL",
			"tags": []
		},
		{
			"url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14933",
			"name": "oval:org.mitre.oval:def:14933",
			"refsource": "OVAL",
			"tags": []
		},
		{
			"url": "http://secunia.com/advisories/48308",
			"name": "48308",
			"refsource": "SECUNIA",
			"tags": []
		},
		{
			"url": "http://www.securityfocus.com/archive/1/519466/100/0/threaded",
			"name": "20110829 [SECURITY] CVE-2011-3190 Apache Tomcat Authentication bypass and information disclosure",
			"refsource": "BUGTRAQ",
			"tags": []
		},
		{
			"url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E",
			"name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/",
			"refsource": "MLIST",
			"tags": []
		},
		{
			"url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E",
			"name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/",
			"refsource": "MLIST",
			"tags": []
		},
		{
			"url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E",
			"name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/",
			"refsource": "MLIST",
			"tags": []
		},
		{
			"url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E",
			"name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/",
			"refsource": "MLIST",
			"tags": []
		}
	],
	"impact": {
		"baseMetricV2": {
			"cvssV2": {
				"version": "2.0",
				"vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P",
				"accessVector": "NETWORK",
				"accessComplexity": "LOW",
				"authentication": "NONE",
				"confidentialityImpact": "PARTIAL",
				"integrityImpact": "PARTIAL",
				"availabilityImpact": "PARTIAL",
				"baseScore": 7.5
			},
			"severity": "HIGH",
			"exploitabilityScore": 10,
			"impactScore": 6.4,
			"obtainAllPrivilege": false,
			"obtainUserPrivilege": false,
			"obtainOtherPrivilege": false,
			"userInteractionRequired": false
		}
	},
	"problem_type": "CWE-264"
}