Vulnerability Details CVE-2012-5887
The HTTP Digest Access Authentication implementation in Apache Tomcat 5.5.x before 5.5.36, 6.x before 6.0.36, and 7.x before 7.0.30 does not properly check for stale nonce values in conjunction with enforcement of proper credentials, which makes it easier for remote attackers to bypass intended access restrictions by sniffing the network for valid requests.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.012
EPSS Ranking 78.2%
CVSS Severity
CVSS v2 Score 5.0
Products affected by CVE-2012-5887
-
cpe:2.3:a:apache:tomcat:5.5.0
-
cpe:2.3:a:apache:tomcat:5.5.1
-
cpe:2.3:a:apache:tomcat:5.5.10
-
cpe:2.3:a:apache:tomcat:5.5.11
-
cpe:2.3:a:apache:tomcat:5.5.12
-
cpe:2.3:a:apache:tomcat:5.5.13
-
cpe:2.3:a:apache:tomcat:5.5.14
-
cpe:2.3:a:apache:tomcat:5.5.15
-
cpe:2.3:a:apache:tomcat:5.5.16
-
cpe:2.3:a:apache:tomcat:5.5.17
-
cpe:2.3:a:apache:tomcat:5.5.18
-
cpe:2.3:a:apache:tomcat:5.5.19
-
cpe:2.3:a:apache:tomcat:5.5.2
-
cpe:2.3:a:apache:tomcat:5.5.20
-
cpe:2.3:a:apache:tomcat:5.5.21
-
cpe:2.3:a:apache:tomcat:5.5.22
-
cpe:2.3:a:apache:tomcat:5.5.23
-
cpe:2.3:a:apache:tomcat:5.5.24
-
cpe:2.3:a:apache:tomcat:5.5.25
-
cpe:2.3:a:apache:tomcat:5.5.26
-
cpe:2.3:a:apache:tomcat:5.5.27
-
cpe:2.3:a:apache:tomcat:5.5.28
-
cpe:2.3:a:apache:tomcat:5.5.29
-
cpe:2.3:a:apache:tomcat:5.5.3
-
cpe:2.3:a:apache:tomcat:5.5.30
-
cpe:2.3:a:apache:tomcat:5.5.31
-
cpe:2.3:a:apache:tomcat:5.5.32
-
cpe:2.3:a:apache:tomcat:5.5.33
-
cpe:2.3:a:apache:tomcat:5.5.34
-
cpe:2.3:a:apache:tomcat:5.5.35
-
cpe:2.3:a:apache:tomcat:5.5.4
-
cpe:2.3:a:apache:tomcat:5.5.5
-
cpe:2.3:a:apache:tomcat:5.5.6
-
cpe:2.3:a:apache:tomcat:5.5.7
-
cpe:2.3:a:apache:tomcat:5.5.8
-
cpe:2.3:a:apache:tomcat:5.5.9
-
cpe:2.3:a:apache:tomcat:6.0.0
-
cpe:2.3:a:apache:tomcat:6.0.1
-
cpe:2.3:a:apache:tomcat:6.0.10
-
cpe:2.3:a:apache:tomcat:6.0.11
-
cpe:2.3:a:apache:tomcat:6.0.12
-
cpe:2.3:a:apache:tomcat:6.0.13
-
cpe:2.3:a:apache:tomcat:6.0.14
-
cpe:2.3:a:apache:tomcat:6.0.15
-
cpe:2.3:a:apache:tomcat:6.0.16
-
cpe:2.3:a:apache:tomcat:6.0.17
-
cpe:2.3:a:apache:tomcat:6.0.18
-
cpe:2.3:a:apache:tomcat:6.0.19
-
cpe:2.3:a:apache:tomcat:6.0.2
-
cpe:2.3:a:apache:tomcat:6.0.20
-
cpe:2.3:a:apache:tomcat:6.0.21
-
cpe:2.3:a:apache:tomcat:6.0.22
-
cpe:2.3:a:apache:tomcat:6.0.23
-
cpe:2.3:a:apache:tomcat:6.0.24
-
cpe:2.3:a:apache:tomcat:6.0.25
-
cpe:2.3:a:apache:tomcat:6.0.26
-
cpe:2.3:a:apache:tomcat:6.0.27
-
cpe:2.3:a:apache:tomcat:6.0.28
-
cpe:2.3:a:apache:tomcat:6.0.29
-
cpe:2.3:a:apache:tomcat:6.0.3
-
cpe:2.3:a:apache:tomcat:6.0.30
-
cpe:2.3:a:apache:tomcat:6.0.31
-
cpe:2.3:a:apache:tomcat:6.0.32
-
cpe:2.3:a:apache:tomcat:6.0.33
-
cpe:2.3:a:apache:tomcat:6.0.34
-
cpe:2.3:a:apache:tomcat:6.0.35
-
cpe:2.3:a:apache:tomcat:6.0.4
-
cpe:2.3:a:apache:tomcat:6.0.5
-
cpe:2.3:a:apache:tomcat:6.0.6
-
cpe:2.3:a:apache:tomcat:6.0.7
-
cpe:2.3:a:apache:tomcat:6.0.8
-
cpe:2.3:a:apache:tomcat:6.0.9
-
cpe:2.3:a:apache:tomcat:7.0.0
-
cpe:2.3:a:apache:tomcat:7.0.1
-
cpe:2.3:a:apache:tomcat:7.0.10
-
cpe:2.3:a:apache:tomcat:7.0.11
-
cpe:2.3:a:apache:tomcat:7.0.12
-
cpe:2.3:a:apache:tomcat:7.0.13
-
cpe:2.3:a:apache:tomcat:7.0.14
-
cpe:2.3:a:apache:tomcat:7.0.15
-
cpe:2.3:a:apache:tomcat:7.0.16
-
cpe:2.3:a:apache:tomcat:7.0.17
-
cpe:2.3:a:apache:tomcat:7.0.18
-
cpe:2.3:a:apache:tomcat:7.0.19
-
cpe:2.3:a:apache:tomcat:7.0.2
-
cpe:2.3:a:apache:tomcat:7.0.20
-
cpe:2.3:a:apache:tomcat:7.0.21
-
cpe:2.3:a:apache:tomcat:7.0.22
-
cpe:2.3:a:apache:tomcat:7.0.23
-
cpe:2.3:a:apache:tomcat:7.0.24
-
cpe:2.3:a:apache:tomcat:7.0.25
-
cpe:2.3:a:apache:tomcat:7.0.26
-
cpe:2.3:a:apache:tomcat:7.0.27
-
cpe:2.3:a:apache:tomcat:7.0.28
-
cpe:2.3:a:apache:tomcat:7.0.29
-
cpe:2.3:a:apache:tomcat:7.0.3
-
cpe:2.3:a:apache:tomcat:7.0.4
-
cpe:2.3:a:apache:tomcat:7.0.5
-
cpe:2.3:a:apache:tomcat:7.0.6
-
cpe:2.3:a:apache:tomcat:7.0.7
-
cpe:2.3:a:apache:tomcat:7.0.8
-
cpe:2.3:a:apache:tomcat:7.0.9