The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
References
Configurations
History
21 Nov 2024, 00:35
Type | Values Removed | Values Added |
---|---|---|
References | () http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html - | |
References | () http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html - | |
References | () http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html - | |
References | () https://issues.apache.org/jira/browse/GERONIMO-1201 - | |
References | () https://issues.apache.org/jira/browse/GERONIMO-3404 - Patch |
Information
Published : 2007-08-27 23:17
Updated : 2024-11-21 00:35
NVD link : CVE-2007-4548
Mitre link : CVE-2007-4548
CVE.ORG link : CVE-2007-4548
JSON object : View
Products Affected
apache
- geronimo
CWE
CWE-287
Improper Authentication