You signed in with another tab or window. Reload to refresh your session.You signed out in another tab or window. Reload to refresh your session.You switched accounts on another tab or window. Reload to refresh your session.Dismiss alert
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
CVE-2021-30640 - Medium Severity Vulnerability
Vulnerable Library - tomcat-embed-core-9.0.45.jar
Core Tomcat implementation
Library home page: https://tomcat.apache.org/
Path to dependency file: /pom.xml
Path to vulnerable library: /home/wss-scanner/.m2/repository/org/apache/tomcat/embed/tomcat-embed-core/9.0.45/tomcat-embed-core-9.0.45.jar
Dependency Hierarchy:
Found in base branch: master
Vulnerability Details
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
Publish Date: 2021-07-12
URL: CVE-2021-30640
CVSS 3 Score Details (6.5)
Base Score Metrics:
Suggested Fix
Type: Upgrade version
Origin: https://lists.apache.org/thread/3qcmnprbtft3phn3vyk06hpycm7p4sgx
Release Date: 2021-07-12
Fix Resolution: org.apache.tomcat:tomcat-catalina:7.0.109,8.5.66,9.0.46,10.0.6;org.apache.tomcat.embed/tomcat-embed-core:7.0.109,8.5.66,9.0.46,10.0.6
Step up your Open Source Security Game with Mend here
The text was updated successfully, but these errors were encountered: