Description
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
CVSS vector
AV:N/AC:L/C:N/I:P/A:NExploitability: 10.0 | Impact: 2.9Complexity: Low
Confidentiality: None
Availability: None
Affected Packages1 packages
🔴Vulnerability Details
3OSVImproper Authentication in Apache Tomcat↗2022-05-17 ▶ GHSAImproper Authentication in Apache Tomcat↗2022-05-17 ▶ CVEListCVE-2012-5886: The HTTP Digest Access Authentication implementation in Apache Tomcat 5↗2012-11-17 ▶ 📋Vendor Advisories
3UbuntuTomcat vulnerabilities↗2012-11-21 ▶ Red Hattomcat: three DIGEST authentication implementation issues↗2012-11-05 ▶ 💬Community
4BugzillaCVE-2012-3439 Rejected: CVE-2012-3439↗2015-10-28 ▶ BugzillaCVE-2012-5885 CVE-2012-5886 CVE-2012-5587 CVE-2012-2733 tomcat various flaws [fedora-16]↗2012-11-06 ▶ BugzillaCVE-2012-5885 CVE-2012-5886 CVE-2012-5587 tomcat5: Three weaknesses in the DIGEST authentication implementation [fedora-16]↗2012-11-06 ▶ BugzillaCVE-2012-5885 CVE-2012-5886 CVE-2012-5587 CVE-2012-2733 tomcat6 various flaws [fedora-all]↗2012-11-06 ▶