Vulnerability Details CVE-2012-5886
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 caches information about the authenticated user within the session state, which makes it easier for remote attackers to bypass authentication via vectors related to the session ID.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.01
EPSS Ranking 76.2%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2012-5886
-
cpe:2.3:a:apache:tomcat:5.5.0
-
cpe:2.3:a:apache:tomcat:5.5.1
-
cpe:2.3:a:apache:tomcat:5.5.10
-
cpe:2.3:a:apache:tomcat:5.5.11
-
cpe:2.3:a:apache:tomcat:5.5.12
-
cpe:2.3:a:apache:tomcat:5.5.13
-
cpe:2.3:a:apache:tomcat:5.5.14
-
cpe:2.3:a:apache:tomcat:5.5.15
-
cpe:2.3:a:apache:tomcat:5.5.16
-
cpe:2.3:a:apache:tomcat:5.5.17
-
cpe:2.3:a:apache:tomcat:5.5.18
-
cpe:2.3:a:apache:tomcat:5.5.19
-
cpe:2.3:a:apache:tomcat:5.5.2
-
cpe:2.3:a:apache:tomcat:5.5.20
-
cpe:2.3:a:apache:tomcat:5.5.21
-
cpe:2.3:a:apache:tomcat:5.5.22
-
cpe:2.3:a:apache:tomcat:5.5.23
-
cpe:2.3:a:apache:tomcat:5.5.24
-
cpe:2.3:a:apache:tomcat:5.5.25
-
cpe:2.3:a:apache:tomcat:5.5.26
-
cpe:2.3:a:apache:tomcat:5.5.27
-
cpe:2.3:a:apache:tomcat:5.5.28
-
cpe:2.3:a:apache:tomcat:5.5.29
-
cpe:2.3:a:apache:tomcat:5.5.3
-
cpe:2.3:a:apache:tomcat:5.5.30
-
cpe:2.3:a:apache:tomcat:5.5.31
-
cpe:2.3:a:apache:tomcat:5.5.32
-
cpe:2.3:a:apache:tomcat:5.5.33
-
cpe:2.3:a:apache:tomcat:5.5.34
-
cpe:2.3:a:apache:tomcat:5.5.35
-
cpe:2.3:a:apache:tomcat:5.5.4
-
cpe:2.3:a:apache:tomcat:5.5.5
-
cpe:2.3:a:apache:tomcat:5.5.6
-
cpe:2.3:a:apache:tomcat:5.5.7
-
cpe:2.3:a:apache:tomcat:5.5.8
-
cpe:2.3:a:apache:tomcat:5.5.9
-
cpe:2.3:a:apache:tomcat:6.0
-
cpe:2.3:a:apache:tomcat:6.0.0
-
cpe:2.3:a:apache:tomcat:6.0.1
-
cpe:2.3:a:apache:tomcat:6.0.10
-
cpe:2.3:a:apache:tomcat:6.0.11
-
cpe:2.3:a:apache:tomcat:6.0.12
-
cpe:2.3:a:apache:tomcat:6.0.13
-
cpe:2.3:a:apache:tomcat:6.0.14
-
cpe:2.3:a:apache:tomcat:6.0.15
-
cpe:2.3:a:apache:tomcat:6.0.16
-
cpe:2.3:a:apache:tomcat:6.0.17
-
cpe:2.3:a:apache:tomcat:6.0.18
-
cpe:2.3:a:apache:tomcat:6.0.19
-
cpe:2.3:a:apache:tomcat:6.0.2
-
cpe:2.3:a:apache:tomcat:6.0.20
-
cpe:2.3:a:apache:tomcat:6.0.24
-
cpe:2.3:a:apache:tomcat:6.0.26
-
cpe:2.3:a:apache:tomcat:6.0.27
-
cpe:2.3:a:apache:tomcat:6.0.28
-
cpe:2.3:a:apache:tomcat:6.0.29
-
cpe:2.3:a:apache:tomcat:6.0.3
-
cpe:2.3:a:apache:tomcat:6.0.30
-
cpe:2.3:a:apache:tomcat:6.0.31
-
cpe:2.3:a:apache:tomcat:6.0.32
-
cpe:2.3:a:apache:tomcat:6.0.33
-
cpe:2.3:a:apache:tomcat:6.0.35
-
cpe:2.3:a:apache:tomcat:6.0.4
-
cpe:2.3:a:apache:tomcat:6.0.5
-
cpe:2.3:a:apache:tomcat:6.0.6
-
cpe:2.3:a:apache:tomcat:6.0.7
-
cpe:2.3:a:apache:tomcat:6.0.8
-
cpe:2.3:a:apache:tomcat:6.0.9
-
cpe:2.3:a:apache:tomcat:7.0.0
-
cpe:2.3:a:apache:tomcat:7.0.1
-
cpe:2.3:a:apache:tomcat:7.0.10
-
cpe:2.3:a:apache:tomcat:7.0.11
-
cpe:2.3:a:apache:tomcat:7.0.12
-
cpe:2.3:a:apache:tomcat:7.0.13
-
cpe:2.3:a:apache:tomcat:7.0.14
-
cpe:2.3:a:apache:tomcat:7.0.15
-
cpe:2.3:a:apache:tomcat:7.0.16
-
cpe:2.3:a:apache:tomcat:7.0.17
-
cpe:2.3:a:apache:tomcat:7.0.18
-
cpe:2.3:a:apache:tomcat:7.0.19
-
cpe:2.3:a:apache:tomcat:7.0.2
-
cpe:2.3:a:apache:tomcat:7.0.20
-
cpe:2.3:a:apache:tomcat:7.0.21
-
cpe:2.3:a:apache:tomcat:7.0.22
-
cpe:2.3:a:apache:tomcat:7.0.23
-
cpe:2.3:a:apache:tomcat:7.0.25
-
cpe:2.3:a:apache:tomcat:7.0.28
-
cpe:2.3:a:apache:tomcat:7.0.3
-
cpe:2.3:a:apache:tomcat:7.0.4
-
cpe:2.3:a:apache:tomcat:7.0.5
-
cpe:2.3:a:apache:tomcat:7.0.6
-
cpe:2.3:a:apache:tomcat:7.0.7
-
cpe:2.3:a:apache:tomcat:7.0.8
-
cpe:2.3:a:apache:tomcat:7.0.9