CVE-2011-1184: Authentication Bypass in Apache Tomcat
5
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.89525%
CWE
-
Published
5/14/2022
Updated
2/21/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.tomcat:tomcat | maven | >= 5.5.0, < 5.5.34 | 5.5.34 |
org.apache.tomcat:tomcat | maven | >= 6.0.0, < 6.0.33 | 6.0.33 |
org.apache.tomcat:tomcat | maven | >= 7.0.0, < 7.0.12 | 7.0.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability stemmed from missing replay attack protections in Digest authentication. The commit diff shows:
- findPrincipal() was completely removed and replaced with DigestInfo validation logic that adds nonce expiration checks and nc validation
- generateNOnce() was modified to include timestamps in nonce generation (renamed to generateNonce), indicating the original version lacked time-based validity checks
- The patch introduced client nonce tracking (cnonces map) and qop validation - features absent in the original code These functions directly handled the cryptographic parameters that were insufficiently validated, making them root causes of the replay vulnerability