CVE-2021-30640

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.

References

https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E

https://www.oracle.com//security-alerts/cpujul2021.html

https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html

https://www.debian.org/security/2021/dsa-4952

https://security.netapp.com/advisory/ntap-20210827-0007/

https://www.debian.org/security/2021/dsa-4986

https://www.oracle.com/security-alerts/cpuoct2021.html

Details

Source: MITRE

Published: 2021-07-12

Updated: 2021-12-09

Type: CWE-287

Risk Information

CVSS v2

Base Score: 5.8

Vector: AV:N/AC:M/Au:N/C:P/I:P/A:N

Impact Score: 4.9

Exploitability Score: 8.6

Severity: MEDIUM

CVSS v3

Base Score: 6.5

Vector: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N

Impact Score: 4.2

Exploitability Score: 2.2

Severity: MEDIUM

Tenable Plugins

View all (23 total)

IDNameProductFamilySeverity
155756RHEL 7 : Red Hat JBoss Web Server 5.6.0 Security release (Important) (RHSA-2021:4861)NessusRed Hat Local Security Checks
medium
155657openSUSE 15 Security Update : tomcat (openSUSE-SU-2021:1490-1)NessusSuSE Local Security Checks
medium
155466SUSE SLES15 Security Update : tomcat (SUSE-SU-2021:3670-1)NessusSuSE Local Security Checks
medium
155463SUSE SLES15 Security Update : tomcat (SUSE-SU-2021:3672-1)NessusSuSE Local Security Checks
medium
155462SUSE SLES15 Security Update : tomcat (SUSE-SU-2021:3669-1)NessusSuSE Local Security Checks
medium
155382openSUSE 15 Security Update : tomcat (openSUSE-SU-2021:3672-1)NessusSuSE Local Security Checks
medium
154907SUSE SLES12 Security Update : tomcat (SUSE-SU-2021:3602-1)NessusSuSE Local Security Checks
medium
154408EulerOS 2.0 SP3 : tomcat (EulerOS-SA-2021-2619)NessusHuawei Local Security Checks
medium
154177Debian DSA-4986-1 : tomcat9 - security updateNessusDebian Local Security Checks
medium
153680EulerOS 2.0 SP5 : tomcat (EulerOS-SA-2021-2520)NessusHuawei Local Security Checks
medium
153656EulerOS 2.0 SP8 : tomcat (EulerOS-SA-2021-2489)NessusHuawei Local Security Checks
medium
153164Amazon Linux AMI : tomcat7 (ALAS-2021-1534)NessusAmazon Linux Local Security Checks
medium
152418Debian DSA-4952-1 : tomcat9 - security updateNessusDebian Local Security Checks
medium
152349Debian DLA-2733-1 : tomcat8 - LTS security updateNessusDebian Local Security Checks
medium
152205FreeBSD : tomcat -- JNDI Realm Authentication Weakness in multiple versions (8b571fb2-f311-11eb-b12b-fc4dd43e2b6a)NessusFreeBSD Local Security Checks
medium
112902Apache Tomcat 7.0.x < 7.0.109 Authentication WeaknessWeb Application ScanningComponent Vulnerability
medium
112901Apache Tomcat 8.5.x < 8.5.66 Authentication WeaknessWeb Application ScanningComponent Vulnerability
medium
112900Apache Tomcat 9.0.0.M1 < 9.0.46 Authentication WeaknessWeb Application ScanningComponent Vulnerability
medium
112899Apache Tomcat 10.0.0-M1 < 10.0.6 Authentication WeaknessWeb Application ScanningComponent Vulnerability
medium
701357Apache Tomcat < 9.0.46 VulnerabilityNessus Network MonitorWeb Servers
medium
701353Apache Tomcat < 8.5.66 VulnerabilityNessus Network MonitorWeb Servers
medium
701352Apache Tomcat < 10.0.6 VulnerabilityNessus Network MonitorWeb Servers
medium
151502Apache Tomcat 10.0.0.M1 < 10.0.6 vulnerabilityNessusWeb Servers
medium