The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
Metrics
Affected Vendors & Products
References
History
Thu, 30 Oct 2025 16:00:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| CPEs | cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.26:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.27:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.29:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.30:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.31:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.32:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.33:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.34:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.35:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.27:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.31:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.6:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.7:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.8:alpha:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0.9:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.13:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.15:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.17:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.18:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.3:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.7:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:7.0.9:*:*:*:*:*:*:* |
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* |
Status: PUBLISHED
Assigner: mitre
Published: 2012-11-17T19:00:00
Updated: 2024-08-06T21:21:27.681Z
Reserved: 2012-11-17T00:00:00
Link: CVE-2012-5887
No data.
Status : Analyzed
Published: 2012-11-17T19:55:02.813
Modified: 2025-10-30T15:49:33.063
Link: CVE-2012-5887