You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
mend-for-github-combot
changed the title
CVE-2016-0762 (Medium) detected in tomcat-catalina-7.0.42.jar
CVE-2016-0762 (Medium) detected in tomcat-catalina-7.0.42.jar, tomcat-embed-core-8.0.18.jar
Mar 25, 2021
CVE-2016-0762 - Medium Severity Vulnerability
Vulnerable Libraries - tomcat-catalina-7.0.42.jar, tomcat-embed-core-8.0.18.jar
tomcat-catalina-7.0.42.jar
Tomcat Servlet Engine Core Classes and Standard implementations
Library home page: http://tomcat.apache.org/
Path to dependency file: /pom.xml
Path to vulnerable library: /repository/org/apache/tomcat/tomcat-catalina/7.0.42/tomcat-catalina-7.0.42.jar
Dependency Hierarchy:
tomcat-embed-core-8.0.18.jar
Core Tomcat implementation
Library home page: http://tomcat.apache.org/
Path to dependency file: /pom.xml
Path to vulnerable library: /repository/org/apache/tomcat/embed/tomcat-embed-core/8.0.18/tomcat-embed-core-8.0.18.jar
Dependency Hierarchy:
Found in HEAD commit: 910335bf446a1a65011c17bf5badb72c4d4efc50
Found in base branches: dev, master
Vulnerability Details
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
Publish Date: 2017-08-10
URL: CVE-2016-0762
CVSS 3 Score Details (5.9)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread.html/1872f96bad43647832bdd84a408794cd06d9cbb557af63085ca10009@%3Cannounce.tomcat.apache.org%3E
Release Date: 2016-10-27
Fix Resolution: 8.0.37
⛑️ Automatic Remediation is available for this issue
The text was updated successfully, but these errors were encountered: