7.8
CVSSv2

CVE-2011-5034

Published: 30/12/2011 Updated: 07/11/2023
CVSS v2 Base Score: 7.8 | Impact Score: 6.9 | Exploitability Score: 10
VMScore: 785
Vector: AV:N/AC:L/Au:N/C:N/I:N/A:C

Vulnerability Summary

Apache Geronimo 2.2.1 and previous versions computes hash values for form parameters without restricting the ability to trigger hash collisions predictably, which allows remote malicious users to cause a denial of service (CPU consumption) by sending many crafted parameters. NOTE: this might overlap CVE-2011-4461.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache geronimo 2.1.5

apache geronimo 2.1.8

apache geronimo 1.0

apache geronimo 2.1.2

apache geronimo 2.1.6

apache geronimo 1.1

apache geronimo 2.2

apache geronimo 2.1.1

apache geronimo 1.1.1

apache geronimo 2.1

apache geronimo 2.1.3

apache geronimo 1.2

apache geronimo 2.1.4

apache geronimo

apache geronimo 2.0.1

apache geronimo 2.0.2

apache geronimo 2.1.7

Exploits

#!/usr/bin/php -q -d short_open_tag=on <? echo "MyBulletinBoard (MyBB) <= 115 'CLIENT-IP' SQL injection / create new admin exploit\n"; echo "by rgod rgod@autisticiorg\n"; echo "site: retrogodaltervistaorg\n"; echo "dork, version specific: \"Powered By MyBB\" \"2006 MyBB Group\"\n\n"; /* works regardless of phpini settings */ if ( ...

References

CWE-20http://www.nruns.com/_downloads/advisory28122011.pdfhttp://www.kb.cert.org/vuls/id/903934http://www.ocert.org/advisories/ocert-2011-003.htmlhttps://github.com/FireFart/HashCollision-DOS-POC/blob/master/HashtablePOC.pyhttp://secunia.com/advisories/47412http://archives.neohapsis.com/archives/bugtraq/2011-12/0181.htmlhttps://lists.apache.org/thread.html/r8dc1a0ae0e0cf9d2494b8cbd66562f99331c4cf635e7781850a9b9ba%40%3Cjava-dev.axis.apache.org%3Ehttps://lists.apache.org/thread.html/r20957aa5962a48328f199e2373f408aeeae601a45dd5275a195e2b6e%40%3Cjava-dev.axis.apache.org%3Ehttps://lists.apache.org/thread.html/r653f633aa7b6ccbb8c338dbfcea7a00e4ae9d6f3e064a03cab8dc20d%40%3Cjava-dev.axis.apache.org%3Ehttps://lists.apache.org/thread.html/r360b70489bad65286b49ceb5303a849d2a7ec7d1292774a7259579e1%40%3Cissues.karaf.apache.org%3Ehttps://lists.apache.org/thread.html/rb0e85243d7268f1d7a1edb5e6c7df885dbd300acabaaf4cb0e880518%40%3Cissues.karaf.apache.org%3Ehttps://lists.apache.org/thread.html/rdd67ea3e489134f653349fc2cb09828ac8462aa61dd776b505a3297a%40%3Cissues.karaf.apache.org%3Ehttps://lists.apache.org/thread.html/r67747af92035942c9c413bd8394acbb8a1ace5833c0177014c825bc2%40%3Cissues.karaf.apache.org%3Ehttps://lists.apache.org/thread.html/r3c541f019b74902e8e61d73e40ecc2837dfce1b744ad5546919b993c%40%3Cissues.karaf.apache.org%3Ehttps://lists.apache.org/thread.html/r4fe6b5ff1d48e23337304fd5ac983d89328aecbd1fa198cfc966fbd7%40%3Cdev.geronimo.apache.org%3Ehttps://lists.apache.org/thread.html/ra10015f6f3c3c88b7d813383554e87c06347fe163487148669189b8e%40%3Cdev.geronimo.apache.org%3Ehttps://lists.apache.org/thread.html/ra1fe29f6399b68980f914d8613dee7f67d62a1a97722fe9cd56f4f5f%40%3Cdev.geronimo.apache.org%3Ehttps://nvd.nist.govhttps://www.exploit-db.com/exploits/2012/