New Search

Apache Tomcat 4.1.0 through 4.1.39 5.5.0 through 5.5.27 and 6.0.0 through 6.0.18 when FORM authentication is used allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords related to improper error checking in the (1) MemoryRealm (2) DataSourceRealm and (3) JDBCRealm authentication realms as demonstrated by a % (percent) value for the j_password parameter.

oval:org.mitre.oval:def:9101

Apache Tomcat 4.1.0 through 4.1.39 5.5.0 through 5.5.27 and 6.0.0 through 6.0.18 when FORM authentication is used allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords related to improper error checking in the (1) MemoryRealm (2) DataSourceRealm and (3) JDBCRealm authentication realms as demonstrated by a % (percent) value for the j_password parameter.

Family:
unix
Status:
ACCEPTED
Platform(s):
  • Red Hat Enterprise Linux 5
  • CentOS Linux 5
  • Oracle Linux 5
Class:
vulnerability
Reference(s):
  • CVE-2009-0580
Product(s):