First published: Sat Jan 14 2012(Updated: )
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12 does not check realm values, which might allow remote attackers to bypass intended access restrictions by leveraging the availability of a protection space with weaker authentication or authorization requirements, a different vulnerability than CVE-2011-1184.
Credit: cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.12 | 7.0.12 |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.33 | 6.0.33 |
maven/org.apache.tomcat:tomcat | >=5.5.0<5.5.34 | 5.5.34 |
Tomcat | =5.5.0 | |
Tomcat | =5.5.1 | |
Tomcat | =5.5.2 | |
Tomcat | =5.5.3 | |
Tomcat | =5.5.4 | |
Tomcat | =5.5.5 | |
Tomcat | =5.5.6 | |
Tomcat | =5.5.7 | |
Tomcat | =5.5.8 | |
Tomcat | =5.5.9 | |
Tomcat | =5.5.10 | |
Tomcat | =5.5.11 | |
Tomcat | =5.5.12 | |
Tomcat | =5.5.13 | |
Tomcat | =5.5.14 | |
Tomcat | =5.5.15 | |
Tomcat | =5.5.16 | |
Tomcat | =5.5.17 | |
Tomcat | =5.5.18 | |
Tomcat | =5.5.19 | |
Tomcat | =5.5.20 | |
Tomcat | =5.5.21 | |
Tomcat | =5.5.22 | |
Tomcat | =5.5.23 | |
Tomcat | =5.5.24 | |
Tomcat | =5.5.25 | |
Tomcat | =5.5.26 | |
Tomcat | =5.5.27 | |
Tomcat | =5.5.28 | |
Tomcat | =5.5.29 | |
Tomcat | =5.5.30 | |
Tomcat | =5.5.31 | |
Tomcat | =5.5.32 | |
Tomcat | =5.5.33 | |
Tomcat | =6.0 | |
Tomcat | =6.0.0 | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.3 | |
Tomcat | =6.0.4 | |
Tomcat | =6.0.5 | |
Tomcat | =6.0.6 | |
Tomcat | =6.0.7 | |
Tomcat | =6.0.8 | |
Tomcat | =6.0.9 | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.11 | |
Tomcat | =6.0.12 | |
Tomcat | =6.0.13 | |
Tomcat | =6.0.14 | |
Tomcat | =6.0.15 | |
Tomcat | =6.0.16 | |
Tomcat | =6.0.17 | |
Tomcat | =6.0.18 | |
Tomcat | =6.0.19 | |
Tomcat | =6.0.20 | |
Tomcat | =6.0.24 | |
Tomcat | =6.0.26 | |
Tomcat | =6.0.27 | |
Tomcat | =6.0.28 | |
Tomcat | =6.0.29 | |
Tomcat | =6.0.30 | |
Tomcat | =6.0.31 | |
Tomcat | =6.0.32 | |
Tomcat | =7.0.0 | |
Tomcat | =7.0.0-beta | |
Tomcat | =7.0.1 | |
Tomcat | =7.0.2 | |
Tomcat | =7.0.3 | |
Tomcat | =7.0.4 | |
Tomcat | =7.0.5 | |
Tomcat | =7.0.6 | |
Tomcat | =7.0.7 | |
Tomcat | =7.0.8 | |
Tomcat | =7.0.9 | |
Tomcat | =7.0.10 | |
Tomcat | =7.0.11 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2011-5063 has a moderate severity rating allowing attackers to bypass access restrictions in affected versions of Apache Tomcat.
To fix CVE-2011-5063, upgrade to Apache Tomcat versions 5.5.34, 6.0.33, or 7.0.12 or later.
CVE-2011-5063 affects Apache Tomcat versions 5.5.x before 5.5.34, 6.x before 6.0.33, and 7.x before 7.0.12.
CVE-2011-5063 exploits a weakness in the HTTP Digest Access Authentication implementation by not checking realm values.
Yes, CVE-2011-5063 can be exploited remotely, allowing attackers to potentially gain unauthorized access to protected resources.