CVE-2009-0580

N/A Unknown
Published: June 05, 2009 Modified: April 23, 2026
View on NVD

Description

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/35326
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35344
Source: secalert@redhat.com
Vendor Advisory
http://secunia.com/advisories/35685
Source: secalert@redhat.com
http://secunia.com/advisories/35788
Source: secalert@redhat.com
http://secunia.com/advisories/37460
Source: secalert@redhat.com
http://secunia.com/advisories/42368
Source: secalert@redhat.com
http://securitytracker.com/id?1022332
Source: secalert@redhat.com
http://support.apple.com/kb/HT4077
Source: secalert@redhat.com
http://svn.apache.org/viewvc?rev=747840&view=rev
Source: secalert@redhat.com
Patch Vendor Advisory
http://svn.apache.org/viewvc?rev=781379&view=rev
Source: secalert@redhat.com
Patch Vendor Advisory
http://svn.apache.org/viewvc?rev=781382&view=rev
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-4.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
Patch Vendor Advisory
http://www.securityfocus.com/bid/35196
Source: secalert@redhat.com
http://www.vupen.com/english/advisories/2009/1496
Source: secalert@redhat.com
Patch Vendor Advisory
http://marc.info/?l=bugtraq&m=127420533226623&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=129070310906557&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=133469267822771&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://marc.info/?l=bugtraq&m=136485229118404&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35326
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35344
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://secunia.com/advisories/35685
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/35788
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/37460
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/42368
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1022332
Source: af854a3a-2127-422b-91ae-364da2661108
http://sunsolve.sun.com/search/document.do?assetkey=1-26-263529-1
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT4077
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?rev=747840&view=rev
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://svn.apache.org/viewvc?rev=781379&view=rev
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://svn.apache.org/viewvc?rev=781382&view=rev
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-4.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.debian.org/security/2011/dsa-2207
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:136
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2009:138
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/504045/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/504108/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/504125/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/35196
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/1496
Source: af854a3a-2127-422b-91ae-364da2661108
Patch Vendor Advisory
http://www.vupen.com/english/advisories/2009/1856
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/3316
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2010/3056
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/50930
Source: af854a3a-2127-422b-91ae-364da2661108

98 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
88.2%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache