2.6
CVSSv2

CVE-2010-1157

Published: 23/04/2010 Updated: 13/02/2023
CVSS v2 Base Score: 2.6 | Impact Score: 2.9 | Exploitability Score: 4.9
VMScore: 265
Vector: AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Summary

Apache Tomcat 5.5.0 up to and including 5.5.29 and 6.0.0 up to and including 6.0.26 might allow remote malicious users to discover the server's hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 5.5.27

apache tomcat 5.5.18

apache tomcat 5.5.12

apache tomcat 5.5.14

apache tomcat 5.5.10

apache tomcat 5.5.4

apache tomcat 5.5.7

apache tomcat 5.5.1

apache tomcat 5.5.11

apache tomcat 5.5.28

apache tomcat 5.5.6

apache tomcat 5.5.26

apache tomcat 5.5.20

apache tomcat 5.5.15

apache tomcat 5.5.5

apache tomcat 5.5.21

apache tomcat 5.5.22

apache tomcat 5.5.3

apache tomcat 5.5.9

apache tomcat 5.5.25

apache tomcat 5.5.2

apache tomcat 5.5.0

apache tomcat 5.5.13

apache tomcat 5.5.24

apache tomcat 5.5.8

apache tomcat 5.5.16

apache tomcat 5.5.17

apache tomcat 5.5.29

apache tomcat 5.5.19

apache tomcat 5.5.23

apache tomcat 6.0.6

apache tomcat 6.0.11

apache tomcat 6.0.7

apache tomcat 6.0.4

apache tomcat 6.0.15

apache tomcat 6.0.20

apache tomcat 6.0.10

apache tomcat 6.0.3

apache tomcat 6.0.9

apache tomcat 6.0.24

apache tomcat 6.0.17

apache tomcat 6.0.0

apache tomcat 6.0.14

apache tomcat 6.0.1

apache tomcat 6.0.12

apache tomcat 6.0.18

apache tomcat 6.0.5

apache tomcat 6.0.2

apache tomcat 6.0.13

apache tomcat 6.0.26

apache tomcat 6.0.19

apache tomcat 6.0.16

apache tomcat 6.0.8

Vendor Advisories

Synopsis Important: jbossweb security update Type/Severity Security Advisory: Important Topic An updated jbossweb package that fixes two security issues is now availablefor JBoss Enterprise Application Platform 42 and 43 for Red HatEnterprise Linux 4 and 5The Red Hat Security Response Team has rated this ...
Debian Bug report logs - #587447 CVE-2010-1157 Package: tomcat6; Maintainer for tomcat6 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@debianorg> Date: Mon, 28 Jun 2010 17:36:02 UTC Severity: important Tags: security Fixed in version tomcat6/6026-5 ...

Exploits

CVE-2010-1157: Apache Tomcat information disclosure vulnerability Severity: Low Vendor: The Apache Software Foundation Versions Affected: - - Tomcat 600 to 6026 - - Tomcat 550 to 5529 Note: The unsupported Tomcat 3x, 4x and 50x versions may also be affected Description: The "WWW-Authenticate" header for BASIC and DIGEST authen ...

References

CWE-200http://tomcat.apache.org/security-6.htmlhttp://tomcat.apache.org/security-5.htmlhttp://www.securityfocus.com/bid/39635http://svn.apache.org/viewvc?view=revision&revision=936540http://secunia.com/advisories/39574http://www.vupen.com/english/advisories/2010/0980http://svn.apache.org/viewvc?view=revision&revision=936541http://www.mandriva.com/security/advisories?name=MDVSA-2010:176http://www.mandriva.com/security/advisories?name=MDVSA-2010:177http://lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.htmlhttp://marc.info/?l=bugtraq&m=129070310906557&w=2http://secunia.com/advisories/42368http://www.vupen.com/english/advisories/2010/3056http://www.vmware.com/security/advisories/VMSA-2011-0003.htmlhttp://secunia.com/advisories/43310http://www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.htmlhttp://www.redhat.com/support/errata/RHSA-2011-0896.htmlhttp://www.redhat.com/support/errata/RHSA-2011-0897.htmlhttp://www.debian.org/security/2011/dsa-2207http://support.apple.com/kb/HT5002http://lists.apple.com/archives/Security-announce/2011//Oct/msg00003.htmlhttp://marc.info/?l=bugtraq&m=136485229118404&w=2http://marc.info/?l=bugtraq&m=139344343412337&w=2http://secunia.com/advisories/57126http://marc.info/?l=bugtraq&m=133469267822771&w=2https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19492http://www.securityfocus.com/archive/1/516397/100/0/threadedhttp://www.securityfocus.com/archive/1/510879/100/0/threadedhttps://lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e%40%3Cdev.tomcat.apache.org%3Ehttps://access.redhat.com/errata/RHSA-2010:0584https://nvd.nist.govhttps://www.exploit-db.com/exploits/12343/