Description
Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-2207-1 | tomcat5.5 security update |
Github GHSA |
GHSA-w227-xcfx-3pj8 | Exposure of Sensitive Information in Apache Tomcat |
Ubuntu USN |
USN-788-1 | Tomcat vulnerabilities |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T04:40:04.335Z
Reserved: 2009-02-13T00:00:00.000Z
Link: CVE-2009-0580
No data.
Status : Modified
Published: 2009-06-05T16:00:00.233
Modified: 2026-04-23T00:35:47.467
Link: CVE-2009-0580
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Github GHSA
Ubuntu USN