Skip to content

Apache Tomcat Allows Remote Attackers to Spoof AJP Requests

High severity GitHub Reviewed Published May 14, 2022 to the GitHub Advisory Database • Updated Feb 21, 2024

Package

maven org.apache.tomcat:tomcat (Maven)

Affected versions

>= 7.0.0, <= 7.0.20
>= 6.0.0, <= 6.0.33
>= 5.0.0, <= 5.5.33

Patched versions

7.0.21
6.0.34
5.5.34

Description

Certain AJP protocol connector implementations in Apache Tomcat 7.0.0 through 7.0.20, 6.0.0 through 6.0.33, 5.5.0 through 5.5.33, and possibly other versions allow remote attackers to spoof AJP requests, bypass authentication, and obtain sensitive information by causing the connector to interpret a request body as a new request.

References

Published by the National Vulnerability Database Aug 31, 2011
Published to the GitHub Advisory Database May 14, 2022
Reviewed Jan 17, 2024
Last updated Feb 21, 2024

Severity

High

EPSS score

1.225%
(86th percentile)

Weaknesses

CVE ID

CVE-2011-3190

GHSA ID

GHSA-c38m-v4m2-524v

Source code

Credits

Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.