The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
References
Configurations
Configuration 1 (hide)
|
History
30 Oct 2025, 15:49
| Type | Values Removed | Values Added |
|---|---|---|
| CPE | cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* |
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* |
| References | () http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html - Third Party Advisory | |
| References | () http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0623.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0629.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0631.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0632.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0633.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0640.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0647.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0648.html - Third Party Advisory | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0726.html - Third Party Advisory | |
| References | () http://secunia.com/advisories/51371 - Broken Link | |
| References | () http://svn.apache.org/viewvc?view=revision&revision=1377807 - Permissions Required | |
| References | () http://svn.apache.org/viewvc?view=revision&revision=1380829 - Permissions Required | |
| References | () http://svn.apache.org/viewvc?view=revision&revision=1392248 - Permissions Required | |
| References | () http://www-01.ibm.com/support/docview.wss?uid=swg21626891 - Third Party Advisory | |
| References | () http://www.securityfocus.com/bid/56403 - Broken Link | |
| References | () http://www.ubuntu.com/usn/USN-1637-1 - Third Party Advisory | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 - Third Party Advisory, VDB Entry |
21 Nov 2024, 01:45
| Type | Values Removed | Values Added |
|---|---|---|
| References | () http://lists.opensuse.org/opensuse-updates/2012-12/msg00089.html - | |
| References | () http://lists.opensuse.org/opensuse-updates/2012-12/msg00090.html - | |
| References | () http://lists.opensuse.org/opensuse-updates/2013-01/msg00037.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0623.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0629.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0631.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0632.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0633.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0640.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0647.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0648.html - | |
| References | () http://rhn.redhat.com/errata/RHSA-2013-0726.html - | |
| References | () http://secunia.com/advisories/51371 - | |
| References | () http://svn.apache.org/viewvc?view=revision&revision=1377807 - | |
| References | () http://svn.apache.org/viewvc?view=revision&revision=1380829 - | |
| References | () http://svn.apache.org/viewvc?view=revision&revision=1392248 - | |
| References | () http://tomcat.apache.org/security-5.html - Vendor Advisory | |
| References | () http://tomcat.apache.org/security-6.html - Vendor Advisory | |
| References | () http://tomcat.apache.org/security-7.html - Vendor Advisory | |
| References | () http://www-01.ibm.com/support/docview.wss?uid=swg21626891 - | |
| References | () http://www.securityfocus.com/bid/56403 - | |
| References | () http://www.ubuntu.com/usn/USN-1637-1 - | |
| References | () https://exchange.xforce.ibmcloud.com/vulnerabilities/79809 - |
Information
Published : 2012-11-17 19:55
Updated : 2025-10-30 15:49
NVD link : CVE-2012-5887
Mitre link : CVE-2012-5887
CVE.ORG link : CVE-2012-5887
JSON object : View
Products Affected
apache
- tomcat
CWE
CWE-287
Improper Authentication
