CVE-2011-3190
Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.
Published at
2011-08-31T23:55Z
4483 days ago
Modified
2019-03-25T11:33Z
1720 days ago
CWE-264
Problem type
References
GET https://vulnerabilitydata.com/api/details/CVE-2011-3190
{ "id": "CVE-2011-3190", "published_date": "2011-08-31T23:55Z", "last_modified_date": "2019-03-25T11:33Z", "assigner": "secalert@redhat.com", "description": "Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.", "references": [ { "url": "http://www.securityfocus.com/bid/49353", "name": "49353", "refsource": "BID", "tags": [] }, { "url": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51698", "name": "https://issues.apache.org/bugzilla/show_bug.cgi?id=51698", "refsource": "MISC", "tags": [ "Exploit" ] }, { "url": "http://secunia.com/advisories/45748", "name": "45748", "refsource": "SECUNIA", "tags": [ "Vendor Advisory" ] }, { "url": "http://www.securitytracker.com/id?1025993", "name": "1025993", "refsource": "SECTRACK", "tags": [] }, { "url": "http://securityreason.com/securityalert/8362", "name": "8362", "refsource": "SREASON", "tags": [] }, { "url": "http://www.mandriva.com/security/advisories?name=MDVSA-2011:156", "name": "MDVSA-2011:156", "refsource": "MANDRIVA", "tags": [] }, { "url": "http://www.debian.org/security/2012/dsa-2401", "name": "DSA-2401", "refsource": "DEBIAN", "tags": [] }, { "url": "http://secunia.com/advisories/49094", "name": "49094", "refsource": "SECUNIA", "tags": [] }, { "url": "http://marc.info/?l=bugtraq&m=132215163318824&w=2", "name": "SSRT100627", "refsource": "HP", "tags": [] }, { "url": "http://marc.info/?l=bugtraq&m=136485229118404&w=2", "name": "HPSBUX02860", "refsource": "HP", "tags": [] }, { "url": "http://marc.info/?l=bugtraq&m=139344343412337&w=2", "name": "HPSBST02955", "refsource": "HP", "tags": [] }, { "url": "http://secunia.com/advisories/57126", "name": "57126", "refsource": "SECUNIA", "tags": [] }, { "url": "http://marc.info/?l=bugtraq&m=133469267822771&w=2", "name": "HPSBOV02762", "refsource": "HP", "tags": [] }, { "url": "https://exchange.xforce.ibmcloud.com/vulnerabilities/69472", "name": "tomcat-ajp-security-bypass(69472)", "refsource": "XF", "tags": [] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19465", "name": "oval:org.mitre.oval:def:19465", "refsource": "OVAL", "tags": [] }, { "url": "https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A14933", "name": "oval:org.mitre.oval:def:14933", "refsource": "OVAL", "tags": [] }, { "url": "http://secunia.com/advisories/48308", "name": "48308", "refsource": "SECUNIA", "tags": [] }, { "url": "http://www.securityfocus.com/archive/1/519466/100/0/threaded", "name": "20110829 [SECURITY] CVE-2011-3190 Apache Tomcat Authentication bypass and information disclosure", "refsource": "BUGTRAQ", "tags": [] }, { "url": "https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E", "name": "[tomcat-dev] 20190319 svn commit: r1855831 [22/30] - in /tomcat/site/trunk: ./ docs/ xdocs/", "refsource": "MLIST", "tags": [] }, { "url": "https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E", "name": "[tomcat-dev] 20190325 svn commit: r1856174 [20/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/", "refsource": "MLIST", "tags": [] }, { "url": "https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E", "name": "[tomcat-dev] 20200203 svn commit: r1873527 [22/30] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "tags": [] }, { "url": "https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E", "name": "[tomcat-dev] 20200213 svn commit: r1873980 [25/34] - /tomcat/site/trunk/docs/", "refsource": "MLIST", "tags": [] } ], "impact": { "baseMetricV2": { "cvssV2": { "version": "2.0", "vectorString": "AV:N/AC:L/Au:N/C:P/I:P/A:P", "accessVector": "NETWORK", "accessComplexity": "LOW", "authentication": "NONE", "confidentialityImpact": "PARTIAL", "integrityImpact": "PARTIAL", "availabilityImpact": "PARTIAL", "baseScore": 7.5 }, "severity": "HIGH", "exploitabilityScore": 10, "impactScore": 6.4, "obtainAllPrivilege": false, "obtainUserPrivilege": false, "obtainOtherPrivilege": false, "userInteractionRequired": false } }, "problem_type": "CWE-264" }