CVE-2009-0580 – org.apache.tomcat:tomcat
Package
Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: >=4.1.0 <4.1.40 || >=5.0.0 <5.5.28 || >=6.0.0 <6.0.19
Severity
Level: Medium
CVSS v3.1: CVSS:3.1/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N/E:U/RL:O/RC:C
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:L/VI:N/VA:N/SC:N/SI:N/SA:N
EPSS: 0.88708 pctl0.99488
Details
Exposure of Sensitive Information in Apache Tomcat Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
Metadata
Created: 2022-05-02T03:16:43Z
Modified: 2022-06-17T00:37:06Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-w227-xcfx-3pj8/GHSA-w227-xcfx-3pj8.json
CWE IDs: ["CWE-200"]
Alternative ID: GHSA-w227-xcfx-3pj8
Finding: F017
Auto approve: 1