CVE-2021-30640
12.07.2021, 15:15
A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.Enginsight
Vendor | Product | Version |
---|---|---|
apache | tomcat | 7.0.0 ≤ 𝑥 < 7.0.109 |
apache | tomcat | 8.5.0 ≤ 𝑥 < 8.5.66 |
apache | tomcat | 9.0.0 ≤ 𝑥 < 9.0.46 |
apache | tomcat | 10.0.0 ≤ 𝑥 < 10.0.6 |
oracle | communications_cloud_native_core_policy | 1.14.0 |
oracle | communications_diameter_signaling_router | 8.0.0 ≤ 𝑥 ≤ 8.5.0 |
oracle | communications_pricing_design_center | 12.0.0.3.0 |
oracle | hospitality_cruise_shipboard_property_management_system | 20.1.0 |
oracle | tekelec_platform_distribution | 7.4.0 ≤ 𝑥 ≤ 7.7.1 |
debian | debian_linux | 9.0 |
debian | debian_linux | 10.0 |
debian | debian_linux | 11.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
tomcat6 |
| ||||||||||||||||||||||||
tomcat7 |
| ||||||||||||||||||||||||
tomcat8 |
| ||||||||||||||||||||||||
tomcat9 |
|
References