We use these services and cookies to improve your user experience. You may opt out if you wish, however, this may limit some features on this site.

Please see our statement on Data Privacy.

Crisp.chat (Helpdesk and Chat)

Ok

THREATINT
PUBLISHED

CVE-2024-52316

Apache Tomcat: Authentication bypass when using Jakarta Authentication API



Description

Unchecked Error Condition vulnerability in Apache Tomcat. If Tomcat is configured to use a custom Jakarta Authentication (formerly JASPIC) ServerAuthContext component which may throw an exception during the authentication process without explicitly setting an HTTP status to indicate failure, the authentication may not fail, allowing the user to bypass the authentication process. There are no known Jakarta Authentication components that behave in this way. This issue affects Apache Tomcat: from 11.0.0-M1 through 11.0.0-M26, from 10.1.0-M1 through 10.1.30, from 9.0.0-M1 through 9.0.95. Users are recommended to upgrade to version 11.0.0, 10.1.31 or 9.0.96, which fix the issue.

Reserved 2024-11-07 | Published 2024-11-18 | Updated 2024-11-19 | Assigner apache

Problem types

CWE-391 Unchecked Error Condition

Product status

Default status
unaffected

11.0.0-M1
affected

10.1.0-M1
affected

9.0.0-M1
affected

References

lists.apache.org/thread/lopzlqh91jj9n334g02om08sbysdb928 vendor-advisory

cve.org (CVE-2024-52316)

nvd.nist.gov (CVE-2024-52316)

Download JSON

Share this page
https://cve.threatint.com/CVE/CVE-2024-52316

Support options

Helpdesk Chat, Email, Knowledgebase
Telegram Chat
Subscribe to our newsletter to learn more about our work.