First published: Sat Nov 03 2007(Updated: )
SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Red Hat Geronimo | =2.0 | |
Red Hat Geronimo | =2.1 | |
Red Hat Geronimo | =2.0.1 | |
Red Hat Geronimo | =2.0.2 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-5797 has a medium severity rating due to its ability to bypass authentication.
To fix CVE-2007-5797, upgrade Apache Geronimo to a patched version that handles nonexistent usernames properly.
CVE-2007-5797 affects Apache Geronimo versions 2.0, 2.0.1, 2.0.2, and 2.1.
CVE-2007-5797 allows attackers to bypass authentication by using any username not found in the database.
No, CVE-2007-5797 is not a minor issue, as it poses a risk of unauthorized access to systems using affected versions of Apache Geronimo.