CVE-2011-5063: Improper Authentication in Apache Tomcat
4.3
CVSS Score
Basic Information
CVE ID
GHSA ID
EPSS Score
0.82673%
CWE
Published
5/14/2022
Updated
2/21/2024
KEV Status
No
Technology
Java
Technical Details
CVSS Vector
AV:N/AC:M/Au:N/C:P/I:N/A:N
Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
---|---|---|---|
org.apache.tomcat:tomcat | maven | >= 5.5.0, < 5.5.34 | 5.5.34 |
org.apache.tomcat:tomcat | maven | >= 6.0.0, < 6.0.33 | 6.0.33 |
org.apache.tomcat:tomcat | maven | >= 7.0.0, < 7.0.12 | 7.0.12 |
Vulnerability Intelligence
Miggo AI
Root Cause Analysis
The vulnerability CVE-2011-5063 stems from improper realm validation in Tomcat's DigestAuthenticator
. Analysis of the commit diff shows the vulnerable findPrincipal
method was replaced with a new DigestInfo
validation class that added realm checks. The original implementation lacked realm comparison logic (comparing request realm against config.getRealmName()
), which allowed realm spoofing. The patch explicitly adds realm validation in DigestInfo.validate()
, confirming this was the missing security check.