CVE-2021-30640
Description
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
CWE
- (none)
Affected
- Apache Software Foundation / Apache Tomcat — v=Apache Tomcat 10 10.0.0-M1 to 10.0.5 [affected]; v=Apache Tomcat 9 9.0.0.M1 to 9.0.45 [affected]; v=Apache Tomcat 8.5 8.5.0 to 8.5.65 [affected]; v=Apache Tomcat 7 7.0.0 to 7.0.108 [affected]
CVSS
- (none)
References
- https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E x_refsource_MISC
- https://www.oracle.com//security-alerts/cpujul2021.html x_refsource_MISC
- https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html mailing-list, x_refsource_MLIST
- https://www.debian.org/security/2021/dsa-4952 vendor-advisory, x_refsource_DEBIAN
- https://www.debian.org/security/2021/dsa-4986 vendor-advisory, x_refsource_DEBIAN
- https://www.oracle.com/security-alerts/cpuoct2021.html x_refsource_MISC
- https://security.netapp.com/advisory/ntap-20210827-0007/ x_refsource_CONFIRM
- https://www.oracle.com/security-alerts/cpujan2022.html x_refsource_MISC
- https://security.gentoo.org/glsa/202208-34 vendor-advisory, x_refsource_GENTOO
Source
cvelistV5-main/cves/2021/30xxx/CVE-2021-30640.json