Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux
Apache Tomcat JNDI Realm Authentication Weakness Vulnerability (Jul 2021) - Windows
Information
Severity
Severity
Family
Family
CVSSv2 Base
CVSSv2 Base
CVSSv2 Vector
CVSSv2 Vector
Solution Type
Solution Type
Created
Created
Modified
Modified
Summary
Apache Tomcat is prone to an authentication weakness vulnerability in the JNDI Realm.
Insight
Insight
Queries made by the JNDI Realm do not always correctly escape parameters. Parameter values could be sourced from user provided data (eg user names) as well as configuration data provided by an administrator. In limited circumstances it is possible for users to authenticate using variations of their user name and/or to bypass some of the protection provided by the LockOut Realm.
Affected Software
Affected Software
Apache Tomcat 7.0.x through 7.0.108, 8.5.x through 8.5.65, 9.0.0.M1 through 9.0.45 and 10.0.0-M1 through 10.0.5.
Detection Method
Detection Method
Checks if a vulnerable version is present on the target host.
Solution
Solution
Update to version 7.0.109, 8.5.66, 9.0.46, 10.0.6 or later.
Common Vulnerabilities and Exposures (CVE)
References
- https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79ed
- https://tomcat.apache.org/security-10.html#Fixed_in_Apache_Tomcat_10.0
- https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.4
- https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.6
- https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.1