CVE-2009-0580

Scores

EPSS

0.882high88.2%
0%20%40%60%80%100%

Percentile: 88.2%

CVSS

5.0medium2.0
0246810

CVSS Score: 5.0/10

All CVSS Scores

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Description

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-200

Exploits

Exploit ID: 33023

Source: exploitdb

URL: https://www.exploit-db.com/exploits/33023

Vulnerable Software (107)

Type: Configuration

Product: ant

Operating System: rhel

Trait:
{  "fixed": "1.6.5-1jpp_1rh"}

Source: redhat

Type: Configuration

Product: avalon-logkit

Operating System: rhel

Trait:
{  "fixed": "1.2-2jpp_4rh"}

Source: redhat

Type: Configuration

Product: axis

Operating System: rhel

Trait:
{  "fixed": "1.2.1-1jpp_3rh"}

Source: redhat

Type: Configuration

Product: classpathx-jaf

Operating System: rhel

Trait:
{  "fixed": "1.0-2jpp_6rh"}

Source: redhat

Type: Configuration

Product: classpathx-mail

Operating System: rhel

Trait:
{  "fixed": "1.1.1-2jpp_8rh"}

Source: redhat

Type: Configuration

Product: geronimo-specs

Operating System: rhel

Trait:
{  "fixed": "1.0-0.M4.1jpp_10rh"}

Source: redhat

Type: Configuration

Product: glassfish-jaxb

Operating System: rhel

Trait:
{  "fixed": "2.1.4-1.11.ep1.el4"}

Source: redhat

Type: Configuration

Product: glassfish-jaxb

Operating System: rhel

Trait:
{  "fixed": "2.1.4-1.11.1.ep1.el5"}

Source: redhat

Type: Configuration

Product: hibernate3

Operating System: rhel

Trait:
{  "fixed": "3.2.4-1.SP1_CP08.0jpp.ep1.2.el4"}

Source: redhat

Type: Configuration

Product: hibernate3

Operating System: rhel

Trait:
{  "fixed": "3.2.4-1.SP1_CP08.0jpp.ep1.2.3.el5"}

Source: redhat

Type: Configuration

Product: hibernate3

Operating System: rhel

Trait:
{  "fixed": "3.2.4-1.SP1_CP08.0jpp.ep1.2.el4"}

Source: redhat

Type: Configuration

Product: hibernate3

Operating System: rhel

Trait:
{  "fixed": "3.2.4-1.SP1_CP08.0jpp.ep1.2.3.el5"}

Source: redhat

Type: Configuration

Product: hibernate3-annotations

Operating System: rhel

Trait:
{  "fixed": "3.3.1-1.10.GA_CP01.ep1.el4"}

Source: redhat

Type: Configuration

Product: hibernate3-annotations

Operating System: rhel

Trait:
{  "fixed": "3.3.1-1.10.1GA_CP01.ep1.el5"}

Source: redhat

Type: Configuration

Product: hibernate3-annotations

Operating System: rhel

Trait:
{  "fixed": "3.3.1-1.10.GA_CP01.ep1.el4"}

Source: redhat

Type: Configuration

Product: hibernate3-annotations

Operating System: rhel

Trait:
{  "fixed": "3.3.1-1.10.1GA_CP01.ep1.el5"}

Source: redhat

Type: Configuration

Product: hibernate3-commons-annotations

Operating System: rhel

Trait:
{  "fixed": "3.0.0-1jpp.ep1.5.el4"}

Source: redhat

Type: Configuration

Product: hibernate3-commons-annotations

Operating System: rhel

Trait:
{  "fixed": "3.0.0-1jpp.ep1.5.2.el5"}

Source: redhat

Type: Configuration

Product: hibernate3-commons-annotations

Operating System: rhel

Trait:
{  "fixed": "3.0.0-1jpp.ep1.5.el4"}

Source: redhat

Type: Configuration

Product: hibernate3-commons-annotations

Operating System: rhel

Trait:
{  "fixed": "3.0.0-1jpp.ep1.5.2.el5"}

Source: redhat