ALAS-2021-1534

Related Vulnerabilities: CVE-2021-30640  

A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. (CVE-2021-30640)

ALAS-2021-1534


Amazon Linux AMI Security Advisory: ALAS-2021-1534
Advisory Release Date: 2021-09-02 22:54 Pacific
Advisory Updated Date: 2021-09-08 19:29 Pacific
Severity: Low
References: CVE-2021-30640 

Issue Overview:

A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. (CVE-2021-30640)


Affected Packages:

tomcat7


Issue Correction:
Run yum update tomcat7 to update your system.

New Packages:
noarch:
    tomcat7-7.0.109-1.41.amzn1.noarch
    tomcat7-lib-7.0.109-1.41.amzn1.noarch
    tomcat7-admin-webapps-7.0.109-1.41.amzn1.noarch
    tomcat7-jsp-2.2-api-7.0.109-1.41.amzn1.noarch
    tomcat7-docs-webapp-7.0.109-1.41.amzn1.noarch
    tomcat7-el-2.2-api-7.0.109-1.41.amzn1.noarch
    tomcat7-webapps-7.0.109-1.41.amzn1.noarch
    tomcat7-log4j-7.0.109-1.41.amzn1.noarch
    tomcat7-servlet-3.0-api-7.0.109-1.41.amzn1.noarch
    tomcat7-javadoc-7.0.109-1.41.amzn1.noarch

src:
    tomcat7-7.0.109-1.41.amzn1.src