CVE-2007-5797
Summary
| CVE | CVE-2007-5797 |
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2007-11-03 00:46:00 UTC |
| Updated | 2011-03-08 03:01:00 UTC |
| Description | SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database. |
NVD Known Affected Configurations (CPE 2.3)
References
| Reference | Source | Link | Tags |
|---|
| Apache Geronimo SQLLoginModule Authentication Bypass Vulnerability |
BID |
www.securityfocus.com |
|
| IBM notice: The page you requested cannot be displayed |
CONFIRM |
www-1.ibm.com |
|
| Webmail - OVH |
VUPEN |
www.vupen.com |
|
| [#GERONIMO-3543] SQLLoginModule successfully authenticates non-existent users - ASF JIRA |
CONFIRM |
issues.apache.org |
|
| Apache Geronimo SQLLoginModule Non-existing User Authentication Security Bypass - Advisories - Secunia |
SECUNIA |
secunia.com |
Vendor Advisory |
| IBM WebSphere Application Server Community Edition SQLLoginModule Security Bypass - Advisories - Secunia |
SECUNIA |
secunia.com |
|
| Webmail - OVH |
VUPEN |
www.vupen.com |
|
| 38662 |
OSVDB |
osvdb.org |
|
| CVE Program record |
CVE.ORG |
www.cve.org |
canonical |
| NVD vulnerability detail |
NVD |
nvd.nist.gov |
canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|
| Red Hat | 2007-11-06 | Mark J Cox | Not vulnerable. This issue did not affect versions of geronimo-specs packages as shipped Red Hat Enterprise Linux 5, Red Hat Application Stack, Red Hat Application Server, Red Hat Directory Server and Red Hat Certificate System, as the geronimo-specs package only contains the specification of the Apache Geronimo Server’s services and interfaces and not the vulnerable J2EE server classes. |
There are currently no legacy QID mappings associated with this CVE.