Miggo Logo

CVE-2011-1184: Authentication Bypass in Apache Tomcat

5

CVSS Score

Basic Information

EPSS Score
0.89525%
CWE
-
Published
5/14/2022
Updated
2/21/2024
KEV Status
No
Technology
TechnologyJava

Technical Details

CVSS Vector
AV:N/AC:L/Au:N/C:P/I:N/A:N
Package NameEcosystemVulnerable VersionsFirst Patched Version
org.apache.tomcat:tomcatmaven>= 5.5.0, < 5.5.345.5.34
org.apache.tomcat:tomcatmaven>= 6.0.0, < 6.0.336.0.33
org.apache.tomcat:tomcatmaven>= 7.0.0, < 7.0.127.0.12

Vulnerability Intelligence
Miggo AIMiggo AI

Miggo AIRoot Cause Analysis

The vulnerability stemmed from missing replay attack protections in Digest authentication. The commit diff shows:

  1. findPrincipal() was completely removed and replaced with DigestInfo validation logic that adds nonce expiration checks and nc validation
  2. generateNOnce() was modified to include timestamps in nonce generation (renamed to generateNonce), indicating the original version lacked time-based validity checks
  3. The patch introduced client nonce tracking (cnonces map) and qop validation - features absent in the original code These functions directly handled the cryptographic parameters that were insufficiently validated, making them root causes of the replay vulnerability

Vulnerable functions

Only Mi**o us*rs **n s** t*is s**tion

WAF Protection Rules

WAF Rule

T** *TTP *i**st ****ss *ut**nti**tion impl*m*nt*tion in *p**** Tom**t *.*.x ***or* *.*.**, *.x ***or* *.*.**, *n* *.x ***or* *.*.** *o*s not **v* t** *xp**t** *ount*rm**sur*s ***inst r*pl*y *tt**ks, w*i** m*k*s it **si*r *or r*mot* *tt**k*rs to *yp*s

Reasoning

T** vuln*r**ility st*mm** *rom missin* r*pl*y *tt**k prot**tions in *i**st *ut**nti**tion. T** *ommit *i** s*ows: *. *in*Prin*ip*l() w*s *ompl*t*ly r*mov** *n* r*pl**** wit* *i**stIn*o v*li**tion lo*i* t**t ***s non** *xpir*tion ****ks *n* n* v*li**t