4.3
CVSSv2

CVE-2012-3546

Published: 19/12/2012 Updated: 19/09/2017
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N

Vulnerability Summary

org/apache/catalina/realm/RealmBase.java in Apache Tomcat 6.x prior to 6.0.36 and 7.x prior to 7.0.30, when FORM authentication is used, allows remote malicious users to bypass security-constraint checks by leveraging a previous setUserPrincipal call and then placing /j_security_check at the end of a URI.

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 6.0

apache tomcat 6.0.0

apache tomcat 6.0.1

apache tomcat 6.0.2

apache tomcat 6.0.3

apache tomcat 6.0.4

apache tomcat 6.0.5

apache tomcat 6.0.6

apache tomcat 6.0.7

apache tomcat 6.0.8

apache tomcat 6.0.9

apache tomcat 6.0.10

apache tomcat 6.0.11

apache tomcat 6.0.12

apache tomcat 6.0.13

apache tomcat 6.0.14

apache tomcat 6.0.15

apache tomcat 6.0.16

apache tomcat 6.0.17

apache tomcat 6.0.18

apache tomcat 6.0.19

apache tomcat 6.0.20

apache tomcat 6.0.24

apache tomcat 6.0.26

apache tomcat 6.0.27

apache tomcat 6.0.28

apache tomcat 6.0.29

apache tomcat 6.0.30

apache tomcat 6.0.31

apache tomcat 6.0.32

apache tomcat 6.0.33

apache tomcat 6.0.35

apache tomcat 7.0.0

apache tomcat 7.0.1

apache tomcat 7.0.2

apache tomcat 7.0.3

apache tomcat 7.0.4

apache tomcat 7.0.5

apache tomcat 7.0.6

apache tomcat 7.0.7

apache tomcat 7.0.8

apache tomcat 7.0.9

apache tomcat 7.0.10

apache tomcat 7.0.11

apache tomcat 7.0.12

apache tomcat 7.0.13

apache tomcat 7.0.14

apache tomcat 7.0.15

apache tomcat 7.0.16

apache tomcat 7.0.17

apache tomcat 7.0.18

apache tomcat 7.0.19

apache tomcat 7.0.20

apache tomcat 7.0.21

apache tomcat 7.0.22

apache tomcat 7.0.23

apache tomcat 7.0.25

apache tomcat 7.0.28

Vendor Advisories

Synopsis Important: JBoss Enterprise SOA Platform 420CP05 and 430CP05 update Type/Severity Security Advisory: Important Topic An update for JBoss Enterprise SOA Platform 420CP05 and 430CP05 thatfixes one security issue is now available from the Red Hat Customer PortalThe Red Hat Security Respon ...
Synopsis Important: tomcat6 security update Type/Severity Security Advisory: Important Topic Updated tomcat6 packages that fix one security issue are now available forJBoss Enterprise Web Server 102 for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingimpo ...
Synopsis Important: jbossweb security update Type/Severity Security Advisory: Important Topic An update for JBoss Enterprise Application Platform 601 that fixes onesecurity issue is now available from the Red Hat Customer PortalThe Red Hat Security Response Team has rated this update as havingimportant s ...
Synopsis Important: tomcat5 security update Type/Severity Security Advisory: Important Topic Updated tomcat5 packages that fix one security issue are now available forJBoss Enterprise Web Server 102 for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingimpo ...
Synopsis Important: jbossas security update Type/Severity Security Advisory: Important Topic Updated jbossas packages that fix one security issue are now available forJBoss Enterprise Application Platform 430 CP10 for Red HatEnterprise Linux 4 and 5The Red Hat Security Response Team has rated this update ...
Synopsis Important: tomcat6 security update Type/Severity Security Advisory: Important Topic Updated tomcat6 packages that fix one security issue are now available forJBoss Enterprise Web Server 200 for Red Hat Enterprise Linux 5 and 6The Red Hat Security Response Team has rated this update as havingimpo ...
Synopsis Important: tomcat6 security update Type/Severity Security Advisory: Important Topic An update for the Apache Tomcat 6 component for JBoss Enterprise Web Server102 that fixes one security issue is now available from the Red HatCustomer PortalThe Red Hat Security Response Team has rated this updat ...
Synopsis Important: JBoss Enterprise Portal Platform 43 CP07 security update Type/Severity Security Advisory: Important Topic An update for JBoss Enterprise Portal Platform 43 CP07 that fixes onesecurity issue is now available from the Red Hat Customer PortalThe Red Hat Security Response Team has rated t ...
Synopsis Important: tomcat6 security update Type/Severity Security Advisory: Important Topic An update for the Apache Tomcat 6 component for JBoss Enterprise Web Server200 that fixes one security issue is now available from the Red HatCustomer PortalThe Red Hat Security Response Team has rated this updat ...
Synopsis Important: jbossweb security update Type/Severity Security Advisory: Important Topic Updated jbossweb packages that fix one security issue are now available forJBoss Enterprise Application Platform 601 for Red Hat Enterprise Linux 5and 6The Red Hat Security Response Team has rated this update as ...
Synopsis Important: tomcat6 security update Type/Severity Security Advisory: Important Topic Updated tomcat6 packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 6The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerab ...
Synopsis Important: tomcat5 security update Type/Severity Security Advisory: Important Topic Updated tomcat5 packages that fix multiple security issues are nowavailable for Red Hat Enterprise Linux 5The Red Hat Security Response Team has rated this update as havingimportant security impact Common Vulnerab ...
Several security issues were fixed in Tomcat ...
Debian Bug report logs - #695250 tomcat6: CVE-2012-4534 CVE-2012-4431 CVE-2012-3546 Package: tomcat6; Maintainer for tomcat6 is Debian Java Maintainers <pkg-java-maintainers@listsaliothdebianorg>; Reported by: Moritz Muehlenhoff <jmm@inutilorg> Date: Thu, 6 Dec 2012 07:48:01 UTC Severity: grave Tags: security F ...
Synopsis Important: JBoss Enterprise Application Platform 520 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Application Platform 520 packages that fixmultiple security issues, various bugs, and add several enhancements arenow available for Red Hat Enterprise Linux 5Th ...
Synopsis Important: JBoss Enterprise Web Platform 520 update Type/Severity Security Advisory: Important Topic JBoss Enterprise Web Platform 520, which fixes multiple security issues,various bugs, and adds several enhancements, is now available from the RedHat Customer PortalThe Red Hat Security Respons ...
Synopsis Important: JBoss Enterprise Application Platform 520 update Type/Severity Security Advisory: Important Topic JBoss Enterprise Application Platform 520, which fixes multiple securityissues, various bugs, and adds several enhancements, is now available fromthe Red Hat Customer PortalThe Red Hat ...
Synopsis Important: JBoss Enterprise Application Platform 520 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Application Platform 520 packages that fixmultiple security issues, various bugs, and add several enhancements arenow available for Red Hat Enterprise Linux 6Th ...
Synopsis Important: JBoss Enterprise Web Platform 520 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Web Platform 520 packages that fix multiplesecurity issues, various bugs, and add several enhancements are nowavailable for Red Hat Enterprise Linux 5The Red Hat Securi ...
Synopsis Important: JBoss Enterprise Web Platform 520 update Type/Severity Security Advisory: Important Topic Updated JBoss Enterprise Web Platform 520 packages that fix multiplesecurity issues, various bugs, and add several enhancements are nowavailable for Red Hat Enterprise Linux 6The Red Hat Securi ...

References

CWE-264http://archives.neohapsis.com/archives/bugtraq/2012-12/0044.htmlhttp://lists.opensuse.org/opensuse-updates/2012-12/msg00089.htmlhttp://lists.opensuse.org/opensuse-updates/2012-12/msg00090.htmlhttp://lists.opensuse.org/opensuse-updates/2013-01/msg00037.htmlhttp://marc.info/?l=bugtraq&m=136612293908376&w=2http://marc.info/?l=bugtraq&m=139344343412337&w=2http://rhn.redhat.com/errata/RHSA-2013-0004.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0005.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0146.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0147.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0151.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0157.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0158.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0162.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0163.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0164.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0191.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0192.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0193.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0194.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0195.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0196.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0197.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0198.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0221.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0235.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0623.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0640.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0641.htmlhttp://rhn.redhat.com/errata/RHSA-2013-0642.htmlhttp://secunia.com/advisories/51984http://secunia.com/advisories/52054http://secunia.com/advisories/57126http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/java/org/apache/catalina/realm/RealmBase.java?r1=1377892&r2=1377891&pathrev=1377892http://svn.apache.org/viewvc/tomcat/tc7.0.x/trunk/webapps/docs/changelog.xml?r1=1377892&r2=1377891&pathrev=1377892http://svn.apache.org/viewvc?view=revision&revision=1377892http://tomcat.apache.org/security-6.htmlhttp://tomcat.apache.org/security-7.htmlhttp://www.securityfocus.com/bid/56812http://www.securitytracker.com/id?1027833http://www.ubuntu.com/usn/USN-1685-1https://h20566.www2.hp.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c03748878https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19305https://access.redhat.com/errata/RHSA-2013:0162https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0641https://nvd.nist.govhttps://usn.ubuntu.com/1685-1/https://www.rapid7.com/db/vulnerabilities/linuxrpm-RHSA-2013-0195