Summary
The host is running Apache Tomcat Server and is prone to multiple security bypass vulnerabilities.
Impact
Successful exploitation could allows remote attackers to bypass intended access restrictions or gain sensitive information.
Impact Level: Application.
Solution
Upgrade Apache Tomcat to 5.5.34, 6.0.33, 7.0.12 or later, For updates refer to http://tomcat.apache.org/
Insight
The flaws are due to errors in the HTTP Digest Access Authentication implementation,
- which fails to check 'qop' and 'realm' values and allows to bypass access restrictions.
- Catalina used as the hard-coded server secret in the DigestAuthenticator.java bypasses cryptographic protection mechanisms.
- which fails to have the expected countermeasures against replay attacks.
Affected
Apache Tomcat 5.5.x to 5.5.33, 6.x to 6.0.32 and 7.x to 7.0.11 on Windows.
References
- http://svn.apache.org/viewvc?view=revision&revision=1087655
- http://svn.apache.org/viewvc?view=revision&revision=1158180
- http://svn.apache.org/viewvc?view=revision&revision=1159309
- http://tomcat.apache.org/security-5.html
- http://tomcat.apache.org/security-6.html
- http://tomcat.apache.org/security-7.html
Updated on 2015-03-25
Severity
Classification
-
CVE CVE-2011-1184, CVE-2011-5062, CVE-2011-5063, CVE-2011-5064 -
CVSS Base Score: 5.0
AV:N/AC:L/Au:N/C:P/I:N/A:N
Related Vulnerabilities
- Apache HTTP Server 'mod_proxy' Reverse Proxy Information Disclosure Vulnerability
- IBM WebSphere Application Server 'plugin-key.kdb' Information Disclosure Vulnerability
- IBM Rational Quality Manager and Rational Test Lab Manager Tomcat Default Account Vulnerability
- Acme thttpd and mini_httpd Terminal Escape Sequence in Logs Command Injection Vulnerability
- IBM WebSphere Application Server (WAS) Security Bypass Vulnerability