5

CVE-2012-5886

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheTomcat Version5.5.0
ApacheTomcat Version5.5.1
ApacheTomcat Version5.5.2
ApacheTomcat Version5.5.3
ApacheTomcat Version5.5.4
ApacheTomcat Version5.5.5
ApacheTomcat Version5.5.6
ApacheTomcat Version5.5.7
ApacheTomcat Version5.5.8
ApacheTomcat Version5.5.9
ApacheTomcat Version5.5.10
ApacheTomcat Version5.5.11
ApacheTomcat Version5.5.12
ApacheTomcat Version5.5.13
ApacheTomcat Version5.5.14
ApacheTomcat Version5.5.15
ApacheTomcat Version5.5.16
ApacheTomcat Version5.5.17
ApacheTomcat Version5.5.18
ApacheTomcat Version5.5.19
ApacheTomcat Version5.5.20
ApacheTomcat Version5.5.21
ApacheTomcat Version5.5.22
ApacheTomcat Version5.5.23
ApacheTomcat Version5.5.24
ApacheTomcat Version5.5.25
ApacheTomcat Version5.5.26
ApacheTomcat Version5.5.27
ApacheTomcat Version5.5.28
ApacheTomcat Version5.5.29
ApacheTomcat Version5.5.30
ApacheTomcat Version5.5.31
ApacheTomcat Version5.5.32
ApacheTomcat Version5.5.33
ApacheTomcat Version5.5.34
ApacheTomcat Version5.5.35
ApacheTomcat Version6.0
ApacheTomcat Version6.0.0
ApacheTomcat Version6.0.0 Updatealpha
ApacheTomcat Version6.0.1
ApacheTomcat Version6.0.1 Updatealpha
ApacheTomcat Version6.0.2
ApacheTomcat Version6.0.2 Updatealpha
ApacheTomcat Version6.0.2 Updatebeta
ApacheTomcat Version6.0.3
ApacheTomcat Version6.0.4
ApacheTomcat Version6.0.4 Updatealpha
ApacheTomcat Version6.0.5
ApacheTomcat Version6.0.6
ApacheTomcat Version6.0.6 Updatealpha
ApacheTomcat Version6.0.7
ApacheTomcat Version6.0.7 Updatealpha
ApacheTomcat Version6.0.7 Updatebeta
ApacheTomcat Version6.0.8
ApacheTomcat Version6.0.8 Updatealpha
ApacheTomcat Version6.0.9
ApacheTomcat Version6.0.9 Updatebeta
ApacheTomcat Version6.0.10
ApacheTomcat Version6.0.11
ApacheTomcat Version6.0.12
ApacheTomcat Version6.0.13
ApacheTomcat Version6.0.14
ApacheTomcat Version6.0.15
ApacheTomcat Version6.0.16
ApacheTomcat Version6.0.17
ApacheTomcat Version6.0.18
ApacheTomcat Version6.0.19
ApacheTomcat Version6.0.20
ApacheTomcat Version6.0.24
ApacheTomcat Version6.0.26
ApacheTomcat Version6.0.27
ApacheTomcat Version6.0.28
ApacheTomcat Version6.0.29
ApacheTomcat Version6.0.30
ApacheTomcat Version6.0.31
ApacheTomcat Version6.0.32
ApacheTomcat Version6.0.33
ApacheTomcat Version6.0.35
ApacheTomcat Version7.0.0
ApacheTomcat Version7.0.0 Updatebeta
ApacheTomcat Version7.0.1
ApacheTomcat Version7.0.2
ApacheTomcat Version7.0.2 Updatebeta
ApacheTomcat Version7.0.3
ApacheTomcat Version7.0.4
ApacheTomcat Version7.0.4 Updatebeta
ApacheTomcat Version7.0.5
ApacheTomcat Version7.0.6
ApacheTomcat Version7.0.7
ApacheTomcat Version7.0.8
ApacheTomcat Version7.0.9
ApacheTomcat Version7.0.10
ApacheTomcat Version7.0.11
ApacheTomcat Version7.0.12
ApacheTomcat Version7.0.13
ApacheTomcat Version7.0.14
ApacheTomcat Version7.0.15
ApacheTomcat Version7.0.16
ApacheTomcat Version7.0.17
ApacheTomcat Version7.0.18
ApacheTomcat Version7.0.19
ApacheTomcat Version7.0.20
ApacheTomcat Version7.0.21
ApacheTomcat Version7.0.22
ApacheTomcat Version7.0.23
ApacheTomcat Version7.0.25
ApacheTomcat Version7.0.28
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 0.76% 0.727
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 5 10 2.9
AV:N/AC:L/Au:N/C:N/I:P/A:N
CWE-287 Improper Authentication

When an actor claims to have a given identity, the product does not prove or insufficiently proves that the claim is correct.