Description
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
Published: 2009-06-05
Score: 4.3 Medium
EPSS: 88.2% High
KEV: No
Impact: n/a
Action: n/a
AI Analysis

Analysis and contextual insights are available on OpenCVE Cloud.

Remediation

No vendor fix or workaround currently provided.

Additional remediation guidance may be available on OpenCVE Cloud.

Tracking

Sign in to view the affected projects.

Advisories
Source ID Title
Debian DSA Debian DSA DSA-2207-1 tomcat5.5 security update
Github GHSA Github GHSA GHSA-w227-xcfx-3pj8 Exposure of Sensitive Information in Apache Tomcat
Ubuntu USN Ubuntu USN USN-788-1 Tomcat vulnerabilities
References
Link Providers
http://lists.apple.com/archives/security-announce/2010//Mar/msg00001.html cve-icon cve-icon
http://lists.opensuse.org/opensuse-security-announce/2009-07/msg00002.html cve-icon cve-icon
http://marc.info/?l=bugtraq&m=127420533226623&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=129070310906557&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=133469267822771&w=2 cve-icon cve-icon
http://marc.info/?l=bugtraq&m=136485229118404&w=2 cve-icon cve-icon
http://secunia.com/advisories/35326 cve-icon cve-icon
http://secunia.com/advisories/35344 cve-icon cve-icon
http://secunia.com/advisories/35685 cve-icon cve-icon
http://secunia.com/advisories/35788 cve-icon cve-icon
http://secunia.com/advisories/37460 cve-icon cve-icon
http://secunia.com/advisories/42368 cve-icon cve-icon
http://securitytracker.com/id?1022332 cve-icon cve-icon
http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1 cve-icon cve-icon
http://support.apple.com/kb/HT4077 cve-icon cve-icon
http://svn.apache.org/viewvc?rev=747840&view=rev cve-icon cve-icon
http://svn.apache.org/viewvc?rev=781379&view=rev cve-icon cve-icon
http://svn.apache.org/viewvc?rev=781382&view=rev cve-icon cve-icon
http://tomcat.apache.org/security-4.html cve-icon cve-icon
http://tomcat.apache.org/security-5.html cve-icon cve-icon
http://tomcat.apache.org/security-6.html cve-icon cve-icon
http://www.debian.org/security/2011/dsa-2207 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2009:138 cve-icon cve-icon
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176 cve-icon cve-icon
http://www.securityfocus.com/archive/1/504045/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/504108/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/504125/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/archive/1/507985/100/0/threaded cve-icon cve-icon
http://www.securityfocus.com/bid/35196 cve-icon cve-icon
http://www.vmware.com/security/advisories/VMSA-2009-0016.html cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1496 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/1856 cve-icon cve-icon
http://www.vupen.com/english/advisories/2009/3316 cve-icon cve-icon
http://www.vupen.com/english/advisories/2010/3056 cve-icon cve-icon
https://exchange.xforce.ibmcloud.com/vulnerabilities/50930 cve-icon cve-icon
https://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2009-0580 cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A18915 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A6628 cve-icon cve-icon
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A9101 cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2009-0580 cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01156.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01216.html cve-icon cve-icon
https://www.redhat.com/archives/fedora-package-announce/2009-November/msg01246.html cve-icon cve-icon
History

No history.

Subscriptions

Apache Tomcat
Redhat Certificate System Enterprise Linux Jboss Enterprise Application Platform Jboss Enterprise Web Server Network Satellite Rhel Application Server Rhel Developer Suite
cve-icon MITRE

Status: PUBLISHED

Assigner: redhat

Published:

Updated: 2024-08-07T04:40:04.335Z

Reserved: 2009-02-13T00:00:00.000Z

Link: CVE-2009-0580

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2009-06-05T16:00:00.233

Modified: 2026-04-23T00:35:47.467

Link: CVE-2009-0580

cve-icon Redhat

Severity : Low

Publid Date: 2009-06-03T00:00:00Z

Links: CVE-2009-0580 - Bugzilla

cve-icon OpenCVE Enrichment

No data.

Weaknesses