Timing Attack

Affecting org.apache.tomcat:tomcat-catalina artifact, versions [7.0.0,7.0.72),[8,8.0.37),[8.5.0,8.5.5),[9-alpha,9.0.0.M10)

Do your applications use this vulnerable package? Test your applications

Overview

org.apache.tomcat:tomcat-catalina Affected versions of the package are vulnerable to Timing Attacks determining valid user names. The Realm implementations did not process the supplied password if the supplied user name did not exist.

Note: The default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.

References

CVSS Score

5.9
medium severity
  • Attack Vector
    Network
  • Attack Complexity
    High
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    None
CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
Credit
The Apache Tomcat Security Team
CVE
CVE-2016-0762
CWE
CWE-208
Snyk ID
SNYK-JAVA-ORGAPACHETOMCAT-30916
Disclosed
28 Oct, 2016
Published
28 Oct, 2016