CVE-2012-5887

The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
References
Link Resource
http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0623.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0629.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0631.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0632.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0633.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0640.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0647.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0648.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0726.html Third Party Advisory
http://secunia.com/advisories/51371 Broken Link
http://svn.apache.org/viewvc?view=revision&revision=1377807 Permissions Required
http://svn.apache.org/viewvc?view=revision&revision=1380829 Permissions Required
http://svn.apache.org/viewvc?view=revision&revision=1392248 Permissions Required
http://tomcat.apache.org/security-5.html Vendor Advisory
http://tomcat.apache.org/security-6.html Vendor Advisory
http://tomcat.apache.org/security-7.html Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21626891 Third Party Advisory
http://www.securityfocus.com/bid/56403 Broken Link
http://www.ubuntu.com/usn/USN-1637-1 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 Third Party Advisory VDB Entry
http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html Third Party Advisory
http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0623.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0629.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0631.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0632.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0633.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0640.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0647.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0648.html Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2013-0726.html Third Party Advisory
http://secunia.com/advisories/51371 Broken Link
http://svn.apache.org/viewvc?view=revision&revision=1377807 Permissions Required
http://svn.apache.org/viewvc?view=revision&revision=1380829 Permissions Required
http://svn.apache.org/viewvc?view=revision&revision=1392248 Permissions Required
http://tomcat.apache.org/security-5.html Vendor Advisory
http://tomcat.apache.org/security-6.html Vendor Advisory
http://tomcat.apache.org/security-7.html Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg21626891 Third Party Advisory
http://www.securityfocus.com/bid/56403 Broken Link
http://www.ubuntu.com/usn/USN-1637-1 Third Party Advisory
https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 Third Party Advisory VDB Entry
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

History

30 Oct 2025, 15:49

Type Values Removed Values Added
CPE cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
References () http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html - () http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html - () http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html - Third Party Advisory
References () http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html - () http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0623.html - () http://rhn.redhat.com/errata/RHSA-2013-0623.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0629.html - () http://rhn.redhat.com/errata/RHSA-2013-0629.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0631.html - () http://rhn.redhat.com/errata/RHSA-2013-0631.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0632.html - () http://rhn.redhat.com/errata/RHSA-2013-0632.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0633.html - () http://rhn.redhat.com/errata/RHSA-2013-0633.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0640.html - () http://rhn.redhat.com/errata/RHSA-2013-0640.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0647.html - () http://rhn.redhat.com/errata/RHSA-2013-0647.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0648.html - () http://rhn.redhat.com/errata/RHSA-2013-0648.html - Third Party Advisory
References () http://rhn.redhat.com/errata/RHSA-2013-0726.html - () http://rhn.redhat.com/errata/RHSA-2013-0726.html - Third Party Advisory
References () http://secunia.com/advisories/51371 - () http://secunia.com/advisories/51371 - Broken Link
References () http://svn.apache.org/viewvc?view=revision&revision=1377807 - () http://svn.apache.org/viewvc?view=revision&revision=1377807 - Permissions Required
References () http://svn.apache.org/viewvc?view=revision&revision=1380829 - () http://svn.apache.org/viewvc?view=revision&revision=1380829 - Permissions Required
References () http://svn.apache.org/viewvc?view=revision&revision=1392248 - () http://svn.apache.org/viewvc?view=revision&revision=1392248 - Permissions Required
References () http://www-01.ibm.com/support/docview.wss?uid=swg21626891 - () http://www-01.ibm.com/support/docview.wss?uid=swg21626891 - Third Party Advisory
References () http://www.securityfocus.com/bid/56403 - () http://www.securityfocus.com/bid/56403 - Broken Link
References () http://www.ubuntu.com/usn/USN-1637-1 - () http://www.ubuntu.com/usn/USN-1637-1 - Third Party Advisory
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 - Third Party Advisory, VDB Entry

21 Nov 2024, 01:45

Type Values Removed Values Added
References () http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html - () http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html -
References () http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html - () http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html -
References () http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html - () http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0623.html - () http://rhn.redhat.com/errata/RHSA-2013-0623.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0629.html - () http://rhn.redhat.com/errata/RHSA-2013-0629.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0631.html - () http://rhn.redhat.com/errata/RHSA-2013-0631.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0632.html - () http://rhn.redhat.com/errata/RHSA-2013-0632.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0633.html - () http://rhn.redhat.com/errata/RHSA-2013-0633.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0640.html - () http://rhn.redhat.com/errata/RHSA-2013-0640.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0647.html - () http://rhn.redhat.com/errata/RHSA-2013-0647.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0648.html - () http://rhn.redhat.com/errata/RHSA-2013-0648.html -
References () http://rhn.redhat.com/errata/RHSA-2013-0726.html - () http://rhn.redhat.com/errata/RHSA-2013-0726.html -
References () http://secunia.com/advisories/51371 - () http://secunia.com/advisories/51371 -
References () http://svn.apache.org/viewvc?view=revision&revision=1377807 - () http://svn.apache.org/viewvc?view=revision&revision=1377807 -
References () http://svn.apache.org/viewvc?view=revision&revision=1380829 - () http://svn.apache.org/viewvc?view=revision&revision=1380829 -
References () http://svn.apache.org/viewvc?view=revision&revision=1392248 - () http://svn.apache.org/viewvc?view=revision&revision=1392248 -
References () http://tomcat.apache.org/security-5.html - Vendor Advisory () http://tomcat.apache.org/security-5.html - Vendor Advisory
References () http://tomcat.apache.org/security-6.html - Vendor Advisory () http://tomcat.apache.org/security-6.html - Vendor Advisory
References () http://tomcat.apache.org/security-7.html - Vendor Advisory () http://tomcat.apache.org/security-7.html - Vendor Advisory
References () http://www-01.ibm.com/support/docview.wss?uid=swg21626891 - () http://www-01.ibm.com/support/docview.wss?uid=swg21626891 -
References () http://www.securityfocus.com/bid/56403 - () http://www.securityfocus.com/bid/56403 -
References () http://www.ubuntu.com/usn/USN-1637-1 - () http://www.ubuntu.com/usn/USN-1637-1 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 -

Information

Published : 2012-11-17 19:55

Updated : 2025-10-30 15:49


NVD link : CVE-2012-5887

Mitre link : CVE-2012-5887

CVE.ORG link : CVE-2012-5887


JSON object : View

Products Affected

apache

  • tomcat
CWE
CWE-287

Improper Authentication