CVE-2021-30640

A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
Configurations

Configuration 1 (hide)

OR cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

Configuration 2 (hide)

OR cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:hospitality_cruise_shipboard_property_management_system:20.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*

Configuration 3 (hide)

OR cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*

History

27 Oct 2022, 01:08

Type Values Removed Values Added
References (GENTOO) https://security.gentoo.org/glsa/202208-34 - (GENTOO) https://security.gentoo.org/glsa/202208-34 - Third Party Advisory

21 Aug 2022, 05:15

Type Values Removed Values Added
References
  • (GENTOO) https://security.gentoo.org/glsa/202208-34 -

12 Jul 2022, 17:42

Type Values Removed Values Added
CWE CWE-287 CWE-116

01 Mar 2022, 18:09

Type Values Removed Values Added
CPE cpe:2.3:a:oracle:hospitality_cruise_shipboard_property_management_system:20.1.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_cloud_native_core_policy:1.14.0:*:*:*:*:*:*:*
References (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - (MISC) https://www.oracle.com/security-alerts/cpujan2022.html - Patch, Third Party Advisory
First Time Oracle hospitality Cruise Shipboard Property Management System
Oracle communications Cloud Native Core Policy

07 Feb 2022, 16:15

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpujan2022.html -

09 Dec 2021, 19:59

Type Values Removed Values Added
References (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html - Patch, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2021/dsa-4986 - (DEBIAN) https://www.debian.org/security/2021/dsa-4986 - Third Party Advisory
CPE cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:11.0:*:*:*:*:*:*:*
cpe:2.3:a:oracle:communications_pricing_design_center:12.0.0.3.0:*:*:*:*:*:*:*

20 Oct 2021, 11:16

Type Values Removed Values Added
References
  • (MISC) https://www.oracle.com/security-alerts/cpuoct2021.html -

15 Oct 2021, 15:15

Type Values Removed Values Added
References
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4986 -

21 Sep 2021, 18:17

Type Values Removed Values Added
CPE cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*
cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*
References (CONFIRM) https://security.netapp.com/advisory/ntap-20210827-0007/ - (CONFIRM) https://security.netapp.com/advisory/ntap-20210827-0007/ - Third Party Advisory
References (MLIST) https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html - (MLIST) https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html - Mailing List, Third Party Advisory
References (DEBIAN) https://www.debian.org/security/2021/dsa-4952 - (DEBIAN) https://www.debian.org/security/2021/dsa-4952 - Third Party Advisory

27 Aug 2021, 07:15

Type Values Removed Values Added
References
  • (CONFIRM) https://security.netapp.com/advisory/ntap-20210827-0007/ -
  • (DEBIAN) https://www.debian.org/security/2021/dsa-4952 -

10 Aug 2021, 15:15

Type Values Removed Values Added
References
  • (MLIST) https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html -

26 Jul 2021, 17:00

Type Values Removed Values Added
CVSS v2 : 6.4
v3 : 8.2
v2 : 5.8
v3 : 6.5

21 Jul 2021, 15:23

Type Values Removed Values Added
CVSS v2 : unknown
v3 : unknown
v2 : 6.4
v3 : 8.2
References
  • (N/A) https://www.oracle.com//security-alerts/cpujul2021.html - Third Party Advisory
References (MISC) https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E - (MISC) https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E - Mailing List, Vendor Advisory
CWE CWE-287
CPE cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

12 Jul 2021, 15:33

Type Values Removed Values Added
New CVE

Information

Published : 2021-07-12 15:15

Updated : 2023-12-10 13:55


NVD link : CVE-2021-30640

Mitre link : CVE-2021-30640

CVE.ORG link : CVE-2021-30640


JSON object : View

Products Affected

oracle

  • communications_diameter_signaling_router
  • communications_cloud_native_core_policy
  • tekelec_platform_distribution
  • communications_pricing_design_center
  • hospitality_cruise_shipboard_property_management_system

debian

  • debian_linux

apache

  • tomcat
CWE
CWE-116

Improper Encoding or Escaping of Output