First published: Mon Aug 27 2007(Updated: )
The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Geronimo | =2.0 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-4548 has a high severity due to its potential to allow unauthorized access and administrative control.
To fix CVE-2007-4548, upgrade to a version of Apache Geronimo that addresses this vulnerability.
CVE-2007-4548 affects Apache Geronimo version 2.0.
If exploited, attackers can bypass authentication and gain administrative access by submitting a blank username and password.
Currently, there are no documented workarounds for CVE-2007-4548, and upgrading is the recommended action.