CVE-2010-1157: Exposure of Sensitive Information to an Unauthorized Actor
(updated )
Apache Tomcat 5.5.0 through 5.5.29 and 6.0.0 through 6.0.26 might allow remote attackers to discover the server’s hostname or IP address by sending a request for a resource that requires (1) BASIC or (2) DIGEST authentication, and then reading the realm field in the WWW-Authenticate header in the reply.
References
- lists.opensuse.org/opensuse-security-announce/2010-09/msg00006.html
- marc.info/?l=bugtraq&m=129070310906557&w=2
- marc.info/?l=bugtraq&m=133469267822771&w=2
- marc.info/?l=bugtraq&m=136485229118404&w=2
- marc.info/?l=bugtraq&m=139344343412337&w=2
- support.apple.com/kb/HT5002
- svn.apache.org/viewvc?view=revision&revision=936540
- svn.apache.org/viewvc?view=revision&revision=936541
- tomcat.apache.org/security-5.html
- tomcat.apache.org/security-6.html
- www.debian.org/security/2011/dsa-2207
- www.vmware.com/security/advisories/VMSA-2011-0003.html
- www.vmware.com/support/vsphere4/doc/vsp_vc41_u1_rel_notes.html
- github.com/advisories/GHSA-w6q7-ww2x-7gm3
- lists.apache.org/thread.html/06cfb634bc7bf37af7d8f760f118018746ad8efbd519c4b789ac9c2e@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/8dcaf7c3894d66cb717646ea1504ea6e300021c85bb4e677dc16b1aa@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r3aacc40356defc3f248aa504b1e48e819dd0471a0a83349080c6bcbf@%3Cdev.tomcat.apache.org%3E
- lists.apache.org/thread.html/r584a714f141eff7b1c358d4679288177bd4ca4558e9999d15867d4b5@%3Cdev.tomcat.apache.org%3E
- nvd.nist.gov/vuln/detail/CVE-2010-1157
- oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A19492
Detect and mitigate CVE-2010-1157 with GitLab Dependency Scanning
Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →