ID

VAR-202107-1598


CVE

CVE-2021-30640


TITLE

Apache Tomcat  Authentication vulnerability in

Trust: 0.8

sources: JVNDB: JVNDB-2021-003001

DESCRIPTION

A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65. Apache Tomcat There is an authentication vulnerability in.Information may be obtained and information may be tampered with. Description: Red Hat support for Spring Boot provides an application platform that reduces the complexity of developing and operating applications (monoliths and microservices) for OpenShift as a containerized platform. -----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 ==================================================================== Red Hat Security Advisory Synopsis: Important: Red Hat JBoss Web Server 5.6.0 Security release Advisory ID: RHSA-2021:4861-01 Product: Red Hat JBoss Web Server Advisory URL: https://access.redhat.com/errata/RHSA-2021:4861 Issue date: 2021-11-30 CVE Names: CVE-2021-30640 CVE-2021-33037 CVE-2021-42340 ==================================================================== 1. Summary: Updated Red Hat JBoss Web Server 5.6.0 packages are now available for Red Hat Enterprise Linux 7 and Red Hat Enterprise Linux 8. Red Hat Product Security has rated this release as having a security impact of Important. A Common Vulnerability Scoring System (CVSS) base score, which gives a detailed severity rating, is available for each vulnerability from the CVE link(s) in the References section. 2. Relevant releases/architectures: Red Hat JBoss Web Server 5.6 for RHEL 7 Server - noarch, x86_64 Red Hat JBoss Web Server 5.6 for RHEL 8 - noarch, x86_64 3. Description: Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. This release of Red Hat JBoss Web Server 5.6.0 serves as a replacement for Red Hat JBoss Web Server 5.5.0. This release includes bug fixes, enhancements and component upgrades, which are documented in the Release Notes, linked to in the References. Security Fix(es): * tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS (CVE-2021-42340) * tomcat: HTTP request smuggling when used with a reverse proxy (CVE-2021-33037) * tomcat: JNDI realm authentication weakness (CVE-2021-30640) For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section. 4. Solution: Before applying this update, make sure all previously released errata relevant to your system have been applied. For details on how to apply this update, refer to: https://access.redhat.com/articles/11258 5. Bugs fixed (https://bugzilla.redhat.com/): 1981533 - CVE-2021-33037 tomcat: HTTP request smuggling when used with a reverse proxy 1981544 - CVE-2021-30640 tomcat: JNDI realm authentication weakness 2014356 - CVE-2021-42340 tomcat: OutOfMemoryError caused by HTTP upgrade connection leak could lead to DoS 6. Package List: Red Hat JBoss Web Server 5.6 for RHEL 7 Server: Source: jws5-tomcat-9.0.50-3.redhat_00004.1.el7jws.src.rpm jws5-tomcat-native-1.2.30-3.redhat_3.el7jws.src.rpm jws5-tomcat-vault-1.1.8-4.Final_redhat_00004.1.el7jws.src.rpm noarch: jws5-tomcat-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-admin-webapps-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-docs-webapp-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-el-3.0-api-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-java-jdk11-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-java-jdk8-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-javadoc-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-jsp-2.3-api-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-lib-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-selinux-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-servlet-4.0-api-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-vault-1.1.8-4.Final_redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-vault-javadoc-1.1.8-4.Final_redhat_00004.1.el7jws.noarch.rpm jws5-tomcat-webapps-9.0.50-3.redhat_00004.1.el7jws.noarch.rpm x86_64: jws5-tomcat-native-1.2.30-3.redhat_3.el7jws.x86_64.rpm jws5-tomcat-native-debuginfo-1.2.30-3.redhat_3.el7jws.x86_64.rpm Red Hat JBoss Web Server 5.6 for RHEL 8: Source: jws5-tomcat-9.0.50-3.redhat_00004.1.el8jws.src.rpm jws5-tomcat-native-1.2.30-3.redhat_3.el8jws.src.rpm jws5-tomcat-vault-1.1.8-4.Final_redhat_00004.1.el8jws.src.rpm noarch: jws5-tomcat-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-admin-webapps-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-docs-webapp-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-el-3.0-api-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-javadoc-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-jsp-2.3-api-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-lib-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-selinux-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-servlet-4.0-api-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-vault-1.1.8-4.Final_redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-vault-javadoc-1.1.8-4.Final_redhat_00004.1.el8jws.noarch.rpm jws5-tomcat-webapps-9.0.50-3.redhat_00004.1.el8jws.noarch.rpm x86_64: jws5-tomcat-native-1.2.30-3.redhat_3.el8jws.x86_64.rpm jws5-tomcat-native-debuginfo-1.2.30-3.redhat_3.el8jws.x86_64.rpm These packages are GPG signed by Red Hat for security. Our key and details on how to verify the signature are available from https://access.redhat.com/security/team/key/ 7. References: https://access.redhat.com/security/cve/CVE-2021-30640 https://access.redhat.com/security/cve/CVE-2021-33037 https://access.redhat.com/security/cve/CVE-2021-42340 https://access.redhat.com/security/updates/classification/#important 8. Contact: The Red Hat security contact is <secalert@redhat.com>. More contact details at https://access.redhat.com/security/team/contact/ Copyright 2021 Red Hat, Inc. -----BEGIN PGP SIGNATURE----- Version: GnuPG v1 iQIVAwUBYaaMntzjgjWX9erEAQibyg/9E3I1wMpKriqTZKlf1tGcPt4wShPVNKMh B4PC8t1vBZJZ2VBMrQJdmYBUKRn3mccCqUxd0ey/UfsacIoKvAACr18iXCxYc4cO MeNqy7SWRO+Kwze2fYpBu7w5dR34yhUQAN8DAOui7DduZsS209X7WhShrLSjzF5j g+nhRCi4l5QRwcy7NF4TAhmAN7f819BwDHQJI/ttaOHqEwsDnOlPNKbV0X4Hlkf5 5VRD/8ArImD7tqpSs/9YVh34MJLCVmVkWgHBDY0I06LcRSQJoRBZDEkoPRHQxU26 hKH5oDaVezm92RFFqfwo2HHY6eGJc/qTTcd/WeW4RDfx49+ARsOt2kvO2XcEo45A iUue2MayqnfdQHRI7MMNaaWoNudI2MVBcbQYhkTZcgApZEmtCe4taeo0YUvFqUeJ N1Awh8QIN5vqA7wKdtrHiQCMx/6/fqi3VtKN3LZEuUiRMM/sueqc1yob6piuU4Vk nyHP0ULSyMYnrzoqKN1BwbobRYyXKbVR376qMtxhLMe71PXg26TgDC9seUnooNum XgcRIdc7Q2WyGaFLxGE5fS0/7FagX/etRlg9DIHi27NVl0WXgmFVLC2ZumjfSoms FgQUTPwa2Bt90Oat2u7vnB5MBvCR0+OAAsM8TK/cn/31F697MMTI6Qloiq2DDOt4 2c2PkIZ6XrY=6RkQ -----END PGP SIGNATURE----- -- RHSA-announce mailing list RHSA-announce@redhat.com https://listman.redhat.com/mailman/listinfo/rhsa-announce . Solution: Before applying the update, back up your existing installation, including all applications, configuration files, databases and database settings, and so on. The References section of this erratum contains a download link for the update. You must be logged in to download the update. For the oldstable distribution (buster), these problems have been fixed in version 9.0.31-1~deb10u6. For the stable distribution (bullseye), these problems have been fixed in version 9.0.43-2~deb11u2. We recommend that you upgrade your tomcat9 packages. For the detailed security status of tomcat9 please refer to its security tracker page at: https://security-tracker.debian.org/tracker/tomcat9 Further information about Debian Security Advisories, how to apply these updates to your system and frequently asked questions can be found at: https://www.debian.org/security/ Mailing list: debian-security-announce@lists.debian.org -----BEGIN PGP SIGNATURE----- iQIzBAEBCgAdFiEEtuYvPRKsOElcDakFEMKTtsN8TjYFAmFok+gACgkQEMKTtsN8 TjZDbg/8D0kfepA/7f6I94IQaO2l83ct22L0KRvFs71rW488M9R9SeBYuwWG63kV Lfptm7+djz1lvbPcHCtbTtmWi6jfLpL/p0QU4NbRoGiv4gkqmBCEhKLKmVWSMp/B KINQXc7QcxpaVN8m2RfIhh4z9kmjcuUTUlfwD5rX253gsfXAPsiQv8KyXDUZV4ga 9GmFllzwWXGA0rfgzPy9owqXbjqs9ZeJj28EkSvxnnPq3U13OQbdH6uqh4MtYF25 kiyL7WClz/zV+ea60GySznHIl/qs0x+JqD4WhFsRImvr8i5YGzz6c7bapU2wdOND FkIJ9/zpxwWvzmtzTqxwlRgKz2IpFz/4xXEFQXpGAMpSP2luXW4BBq/IKzQNqb84 uIGJmHRiDEiwQ9C3JPK4LGP8lvkqmCDQRCDfF/Q8V8DW1KZJKbIHa0ZRcTj07JlB 9CJvVAWoiwrzFCgnt249Y++pdxlk8bP1d4xhD5eU88+B+t3YEtiqhJpKqlkxSVFx M/twu7ivJtQBZ6MTyP4L84evi8YvPKQcFwydP3H+cJU5+BjkbSnxhP7Era3+tKDH +D0W4u9CUH+GFYvXwclZsXBPQOWyEeDoS7mG3JLQ2eP5EvS9I+8e++aHC57JY8rd 22pSwzrEAf7kqEqct3kIpUHbN/zfemOrSlx8Apm4Ns3ze1380/o= =sRPH -----END PGP SIGNATURE----- . - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Gentoo Linux Security Advisory GLSA 202208-34 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - https://security.gentoo.org/ - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Severity: Low Title: Apache Tomcat: Multiple Vulnerabilities Date: August 21, 2022 Bugs: #773571, #801916, #818160, #855971 ID: 202208-34 - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - - Synopsis ======= Multiple vulnerabilities have been discovered in Apache Tomcat, the worst of which could result in denial of service. Affected packages ================ ------------------------------------------------------------------- Package / Vulnerable / Unaffected ------------------------------------------------------------------- 1 www-servers/tomcat < 8.5.82:8.5 >= 8.5.82:8.5 < 9.0.65:9 >= 9.0.65:9 < 10.0.23:10 >= 10.0.23:10 Description ========== Multiple vulnerabilities have been discovered in Apache Tomcat. Please review the CVE identifiers referenced below for details. Impact ===== Please review the referenced CVE identifiers for details. Workaround ========= There is no known workaround at this time. Resolution ========= All Apache Tomcat 10.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/tomcat-10.0.23:10" All Apache Tomcat 9.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/tomcat-9.0.65:9" All Apache Tomcat 8.5.x users should upgrade to the latest version: # emerge --sync # emerge --ask --oneshot --verbose ">=www-servers/tomcat-8.5.82:8.5" References ========= [ 1 ] CVE-2021-25122 https://nvd.nist.gov/vuln/detail/CVE-2021-25122 [ 2 ] CVE-2021-25329 https://nvd.nist.gov/vuln/detail/CVE-2021-25329 [ 3 ] CVE-2021-30639 https://nvd.nist.gov/vuln/detail/CVE-2021-30639 [ 4 ] CVE-2021-30640 https://nvd.nist.gov/vuln/detail/CVE-2021-30640 [ 5 ] CVE-2021-33037 https://nvd.nist.gov/vuln/detail/CVE-2021-33037 [ 6 ] CVE-2021-42340 https://nvd.nist.gov/vuln/detail/CVE-2021-42340 [ 7 ] CVE-2022-34305 https://nvd.nist.gov/vuln/detail/CVE-2022-34305 Availability =========== This GLSA and any updates to it are available for viewing at the Gentoo Security Website: https://security.gentoo.org/glsa/202208-34 Concerns? ======== Security is a primary focus of Gentoo Linux and ensuring the confidentiality and security of our users' machines is of utmost importance to us. Any security concerns should be addressed to security@gentoo.org or alternatively, you may file a bug at https://bugs.gentoo.org. License ====== Copyright 2022 Gentoo Foundation, Inc; referenced text belongs to its owner(s). The contents of this document are licensed under the Creative Commons - Attribution / Share Alike license. https://creativecommons.org/licenses/by-sa/2.5 . The purpose of this text-only errata is to inform you about the security issues fixed in this release. Installation instructions are available from the Fuse 7.11.0 product documentation page: https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/ 4

Trust: 2.43

sources: NVD: CVE-2021-30640 // JVNDB: JVNDB-2021-003001 // VULHUB: VHN-390363 // VULMON: CVE-2021-30640 // PACKETSTORM: 166707 // PACKETSTORM: 165117 // PACKETSTORM: 165112 // PACKETSTORM: 169105 // PACKETSTORM: 169139 // PACKETSTORM: 168127 // PACKETSTORM: 167841

AFFECTED PRODUCTS

vendor:oraclemodel:communications cloud native core policyscope:eqversion:1.14.0

Trust: 1.0

vendor:apachemodel:tomcatscope:gteversion:10.0.0

Trust: 1.0

vendor:apachemodel:tomcatscope:ltversion:9.0.46

Trust: 1.0

vendor:oraclemodel:hospitality cruise shipboard property management systemscope:eqversion:20.1.0

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:gteversion:7.4.0

Trust: 1.0

vendor:apachemodel:tomcatscope:gteversion:7.0.0

Trust: 1.0

vendor:oraclemodel:tekelec platform distributionscope:lteversion:7.7.1

Trust: 1.0

vendor:apachemodel:tomcatscope:gteversion:8.5.0

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:gteversion:8.0.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:11.0

Trust: 1.0

vendor:apachemodel:tomcatscope:ltversion:10.0.6

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:10.0

Trust: 1.0

vendor:debianmodel:linuxscope:eqversion:9.0

Trust: 1.0

vendor:apachemodel:tomcatscope:ltversion:8.5.66

Trust: 1.0

vendor:oraclemodel:communications pricing design centerscope:eqversion:12.0.0.3.0

Trust: 1.0

vendor:oraclemodel:communications diameter signaling routerscope:lteversion:8.5.0

Trust: 1.0

vendor:apachemodel:tomcatscope:ltversion:7.0.109

Trust: 1.0

vendor:apachemodel:tomcatscope:gteversion:9.0.0

Trust: 1.0

vendor:日本電気model:addpointscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive edge device managementscope: - version: -

Trust: 0.8

vendor:日本電気model:iot データストアscope: - version: -

Trust: 0.8

vendor:日本電気model:simpwrightscope: - version: -

Trust: 0.8

vendor:apachemodel:tomcatscope: - version: -

Trust: 0.8

vendor:オラクルmodel:oracle communications diameter signaling routerscope: - version: -

Trust: 0.8

vendor:日本電気model:websamscope: - version: -

Trust: 0.8

vendor:日本電気model:retrieemscope: - version: -

Trust: 0.8

vendor:日本電気model:connexive pfscope: - version: -

Trust: 0.8

vendor:日立model:hitachi ops center common servicesscope: - version: -

Trust: 0.8

vendor:日本電気model:elastic matcherscope: - version: -

Trust: 0.8

vendor:日本電気model:esmpro/servermanagerscope: - version: -

Trust: 0.8

vendor:日本電気model:infocagescope: - version: -

Trust: 0.8

vendor:日本電気model:secureware/clmscope: - version: -

Trust: 0.8

vendor:debianmodel:gnu/linuxscope: - version: -

Trust: 0.8

sources: JVNDB: JVNDB-2021-003001 // NVD: CVE-2021-30640

CVSS

SEVERITY

CVSSV2

CVSSV3

nvd@nist.gov: CVE-2021-30640
value: MEDIUM

Trust: 1.0

NVD: CVE-2021-30640
value: MEDIUM

Trust: 0.8

CNNVD: CNNVD-202107-684
value: MEDIUM

Trust: 0.6

VULHUB: VHN-390363
value: MEDIUM

Trust: 0.1

VULMON: CVE-2021-30640
value: MEDIUM

Trust: 0.1

nvd@nist.gov: CVE-2021-30640
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 1.9

VULHUB: VHN-390363
severity: MEDIUM
baseScore: 5.8
vectorString: AV:N/AC:M/AU:N/C:P/I:P/A:N
accessVector: NETWORK
accessComplexity: MEDIUM
authentication: NONE
confidentialityImpact: PARTIAL
integrityImpact: PARTIAL
availabilityImpact: NONE
exploitabilityScore: 8.6
impactScore: 4.9
acInsufInfo: NONE
obtainAllPrivilege: NONE
obtainUserPrivilege: NONE
obtainOtherPrivilege: NONE
userInteractionRequired: NONE
version: 2.0

Trust: 0.1

nvd@nist.gov: CVE-2021-30640
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: 2.2
impactScore: 4.2
version: 3.1

Trust: 1.0

NVD: CVE-2021-30640
baseSeverity: MEDIUM
baseScore: 6.5
vectorString: CVSS:3.0/AV:N/AC:H/PR:N/UI:N/S:U/C:L/I:H/A:N
attackVector: NETWORK
attackComplexity: HIGH
privilegesRequired: NONE
userInteraction: NONE
scope: UNCHANGED
confidentialityImpact: LOW
integrityImpact: HIGH
availabilityImpact: NONE
exploitabilityScore: NONE
impactScore: NONE
version: 3.0

Trust: 0.8

sources: VULHUB: VHN-390363 // VULMON: CVE-2021-30640 // JVNDB: JVNDB-2021-003001 // CNNVD: CNNVD-202107-684 // NVD: CVE-2021-30640

PROBLEMTYPE DATA

problemtype:CWE-116

Trust: 1.1

problemtype:Inappropriate authentication (CWE-287) [NVD evaluation ]

Trust: 0.8

problemtype:CWE-287

Trust: 0.1

sources: VULHUB: VHN-390363 // JVNDB: JVNDB-2021-003001 // NVD: CVE-2021-30640

THREAT TYPE

remote

Trust: 0.6

sources: CNNVD: CNNVD-202107-684

TYPE

authorization issue

Trust: 0.6

sources: CNNVD: CNNVD-202107-684

PATCH

title:hitachi-sec-2021-134url:https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3Cannounce.tomcat.apache.org%3E

Trust: 0.8

title:Apache Tomcat Fixes for access control error vulnerabilitiesurl:http://www.cnnvd.org.cn/web/xxk/bdxqById.tag?id=156356

Trust: 0.6

title:Amazon Linux AMI: ALAS-2021-1534url:https://vulmon.com/vendoradvisory?qidtp=amazon_linux_ami&qid=ALAS-2021-1534

Trust: 0.1

title:Debian Security Advisories: DSA-4952-1 tomcat9 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=34a8611657c60f45f0bee7f033163917

Trust: 0.1

title:Debian Security Advisories: DSA-4986-1 tomcat9 -- security updateurl:https://vulmon.com/vendoradvisory?qidtp=debian_security_advisories&qid=c7fc8127c2d2f38a1e1867946fc5a810

Trust: 0.1

title:Debian CVElist Bug Report Logs: tomcat9: CVE-2021-33037 CVE-2021-30640 CVE-2021-30639url:https://vulmon.com/vendoradvisory?qidtp=debian_cvelist_bugreportlogs&qid=c76b2125cc2898e046bae42a78fc87ed

Trust: 0.1

title:Red Hat: Important: Red Hat support for Spring Boot 2.5.10 updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20221179 - Security Advisory

Trust: 0.1

title:Red Hat: CVE-2021-30640url:https://vulmon.com/vendoradvisory?qidtp=red_hat_cve_database&qid=CVE-2021-30640

Trust: 0.1

title:Ubuntu Security Notice: USN-5360-1: Tomcat vulnerabilitiesurl:https://vulmon.com/vendoradvisory?qidtp=ubuntu_security_notice&qid=USN-5360-1

Trust: 0.1

title:Red Hat: Important: Red Hat Fuse 7.11.0 release and security updateurl:https://vulmon.com/vendoradvisory?qidtp=red_hat_security_advisories&qid=RHSA-20225532 - Security Advisory

Trust: 0.1

title:Hitachi Security Advisories: Multiple Vulnerabilities in Hitachi Ops Center Common Servicesurl:https://vulmon.com/vendoradvisory?qidtp=hitachi_security_advisories&qid=hitachi-sec-2021-134

Trust: 0.1

title: - url:https://github.com/Live-Hack-CVE/CVE-2021-30640

Trust: 0.1

sources: VULMON: CVE-2021-30640 // JVNDB: JVNDB-2021-003001 // CNNVD: CNNVD-202107-684

EXTERNAL IDS

db:NVDid:CVE-2021-30640

Trust: 4.1

db:PACKETSTORMid:165112

Trust: 0.8

db:PACKETSTORMid:168127

Trust: 0.8

db:JVNid:JVNVU91880022

Trust: 0.8

db:JVNDBid:JVNDB-2021-003001

Trust: 0.8

db:PACKETSTORMid:166707

Trust: 0.7

db:CS-HELPid:SB2021090825

Trust: 0.6

db:CS-HELPid:SB2021081231

Trust: 0.6

db:CS-HELPid:SB2021113014

Trust: 0.6

db:CS-HELPid:SB2022070812

Trust: 0.6

db:CS-HELPid:SB2022040522

Trust: 0.6

db:CS-HELPid:SB2021072902

Trust: 0.6

db:CS-HELPid:SB2021101512

Trust: 0.6

db:AUSCERTid:ESB-2021.2676

Trust: 0.6

db:AUSCERTid:ESB-2021.4028

Trust: 0.6

db:AUSCERTid:ESB-2021.3414

Trust: 0.6

db:AUSCERTid:ESB-2021.2567

Trust: 0.6

db:AUSCERTid:ESB-2021.3924

Trust: 0.6

db:AUSCERTid:ESB-2021.3688

Trust: 0.6

db:AUSCERTid:ESB-2021.2359

Trust: 0.6

db:AUSCERTid:ESB-2021.2647

Trust: 0.6

db:AUSCERTid:ESB-2022.1404

Trust: 0.6

db:CNNVDid:CNNVD-202107-684

Trust: 0.6

db:PACKETSTORMid:165117

Trust: 0.2

db:VULHUBid:VHN-390363

Trust: 0.1

db:VULMONid:CVE-2021-30640

Trust: 0.1

db:PACKETSTORMid:169105

Trust: 0.1

db:PACKETSTORMid:169139

Trust: 0.1

db:PACKETSTORMid:167841

Trust: 0.1

sources: VULHUB: VHN-390363 // VULMON: CVE-2021-30640 // JVNDB: JVNDB-2021-003001 // PACKETSTORM: 166707 // PACKETSTORM: 165117 // PACKETSTORM: 165112 // PACKETSTORM: 169105 // PACKETSTORM: 169139 // PACKETSTORM: 168127 // PACKETSTORM: 167841 // CNNVD: CNNVD-202107-684 // NVD: CVE-2021-30640

REFERENCES

url:https://www.oracle.com/security-alerts/cpuoct2021.html

Trust: 2.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-30640

Trust: 2.0

url:https://security.gentoo.org/glsa/202208-34

Trust: 1.9

url:https://security.netapp.com/advisory/ntap-20210827-0007/

Trust: 1.8

url:https://www.debian.org/security/2021/dsa-4952

Trust: 1.8

url:https://www.debian.org/security/2021/dsa-4986

Trust: 1.8

url:https://lists.apache.org/thread.html/r59f9ef03929d32120f91f4ea7e6e79edd5688d75d0a9b65fd26d1fe8%40%3cannounce.tomcat.apache.org%3e

Trust: 1.8

url:https://www.oracle.com//security-alerts/cpujul2021.html

Trust: 1.8

url:https://www.oracle.com/security-alerts/cpujan2022.html

Trust: 1.8

url:https://lists.debian.org/debian-lts-announce/2021/08/msg00009.html

Trust: 1.8

url:https://access.redhat.com/security/cve/cve-2021-30640

Trust: 1.0

url:https://jvn.jp/vu/jvnvu91880022/

Trust: 0.8

url:https://www.cybersecurity-help.cz/vdb/sb2021113014

Trust: 0.6

url:https://packetstormsecurity.com/files/166707/red-hat-security-advisory-2022-1179-01.html

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2647

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3924

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2359

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2567

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3414

Trust: 0.6

url:https://packetstormsecurity.com/files/165112/red-hat-security-advisory-2021-4863-06.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022040522

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.4028

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.2676

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2021.3688

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021072902

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021090825

Trust: 0.6

url:https://packetstormsecurity.com/files/168127/gentoo-linux-security-advisory-202208-34.html

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2022070812

Trust: 0.6

url:https://www.ibm.com/support/pages/node/6483317

Trust: 0.6

url:https://vigilance.fr/vulnerability/apache-tomcat-weakness-in-authentication-35861

Trust: 0.6

url:https://www.auscert.org.au/bulletins/esb-2022.1404

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021081231

Trust: 0.6

url:https://www.cybersecurity-help.cz/vdb/sb2021101512

Trust: 0.6

url:https://nvd.nist.gov/vuln/detail/cve-2021-33037

Trust: 0.5

url:https://access.redhat.com/security/updates/classification/#important

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-33037

Trust: 0.4

url:https://access.redhat.com/security/team/contact/

Trust: 0.4

url:https://nvd.nist.gov/vuln/detail/cve-2021-42340

Trust: 0.4

url:https://bugzilla.redhat.com/):

Trust: 0.4

url:https://listman.redhat.com/mailman/listinfo/rhsa-announce

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-42340

Trust: 0.4

url:https://access.redhat.com/security/cve/cve-2021-3859

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3642

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-3629

Trust: 0.2

url:https://access.redhat.com/security/cve/cve-2021-41079

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-41079

Trust: 0.2

url:https://www.debian.org/security/faq

Trust: 0.2

url:https://security-tracker.debian.org/tracker/tomcat9

Trust: 0.2

url:https://www.debian.org/security/

Trust: 0.2

url:https://nvd.nist.gov/vuln/detail/cve-2021-25122

Trust: 0.2

url:https://cwe.mitre.org/data/definitions/116.html

Trust: 0.1

url:https://github.com/live-hack-cve/cve-2021-30640

Trust: 0.1

url:https://nvd.nist.gov

Trust: 0.1

url:https://alas.aws.amazon.com/alas-2021-1534.html

Trust: 0.1

url:https://ubuntu.com/security/notices/usn-5360-1

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_support_for_spring_boot/2.5/html/release_notes_for_spring_boot_2.5/index

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-20289

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3859

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3597

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-20289

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3597

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product\xcatrhoar.spring.boot&version=2.5.10

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3629

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-3642

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:1179

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4861

Trust: 0.1

url:https://access.redhat.com/security/team/key/

Trust: 0.1

url:https://access.redhat.com/articles/11258

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2021:4863

Trust: 0.1

url:https://creativecommons.org/licenses/by-sa/2.5

Trust: 0.1

url:https://security.gentoo.org/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2022-34305

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-25329

Trust: 0.1

url:https://bugs.gentoo.org.

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-30639

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-29582

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-40690

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-0084

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25122

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-25845

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22060

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22573

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-2471

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26336

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22119

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-24122

Trust: 0.1

url:https://access.redhat.com/documentation/en-us/red_hat_fuse/7.11/

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22569

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22970

Trust: 0.1

url:https://access.redhat.com/jbossnetwork/restricted/listsoftware.html?downloadtype=distributions&product=jboss.fuse&version=7.11.0

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-7020

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22119

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23913

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-35517

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-35516

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-33813

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21724

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22950

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22932

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-30126

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22978

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-25329

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-4178

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22971

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22096

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3807

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-38153

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-15250

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23181

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-36518

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-15250

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43797

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22096

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22976

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22573

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-7020

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-22968

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1319

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-24614

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-25689

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-22569

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23596

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-25689

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-24122

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-36090

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-23221

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2021-22060

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-21363

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-9484

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-43859

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-26520

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-2471

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-42550

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-9484

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-41766

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-29505

Trust: 0.1

url:https://nvd.nist.gov/vuln/detail/cve-2020-29582

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2020-36518

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2022-1259

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-35515

Trust: 0.1

url:https://access.redhat.com/errata/rhsa-2022:5532

Trust: 0.1

url:https://access.redhat.com/security/cve/cve-2021-3644

Trust: 0.1

sources: VULHUB: VHN-390363 // VULMON: CVE-2021-30640 // JVNDB: JVNDB-2021-003001 // PACKETSTORM: 166707 // PACKETSTORM: 165117 // PACKETSTORM: 165112 // PACKETSTORM: 169105 // PACKETSTORM: 169139 // PACKETSTORM: 168127 // PACKETSTORM: 167841 // CNNVD: CNNVD-202107-684 // NVD: CVE-2021-30640

CREDITS

Red Hat

Trust: 0.4

sources: PACKETSTORM: 166707 // PACKETSTORM: 165117 // PACKETSTORM: 165112 // PACKETSTORM: 167841

SOURCES

db:VULHUBid:VHN-390363
db:VULMONid:CVE-2021-30640
db:JVNDBid:JVNDB-2021-003001
db:PACKETSTORMid:166707
db:PACKETSTORMid:165117
db:PACKETSTORMid:165112
db:PACKETSTORMid:169105
db:PACKETSTORMid:169139
db:PACKETSTORMid:168127
db:PACKETSTORMid:167841
db:CNNVDid:CNNVD-202107-684
db:NVDid:CVE-2021-30640

LAST UPDATE DATE

2024-08-14T12:31:14.406000+00:00


SOURCES UPDATE DATE

db:VULHUBid:VHN-390363date:2022-10-27T00:00:00
db:VULMONid:CVE-2021-30640date:2022-10-27T00:00:00
db:JVNDBid:JVNDB-2021-003001date:2022-12-13T07:05:00
db:CNNVDid:CNNVD-202107-684date:2022-08-23T00:00:00
db:NVDid:CVE-2021-30640date:2022-10-27T01:08:51.290

SOURCES RELEASE DATE

db:VULHUBid:VHN-390363date:2021-07-12T00:00:00
db:VULMONid:CVE-2021-30640date:2021-07-12T00:00:00
db:JVNDBid:JVNDB-2021-003001date:2021-10-14T00:00:00
db:PACKETSTORMid:166707date:2022-04-13T15:02:31
db:PACKETSTORMid:165117date:2021-12-01T16:38:47
db:PACKETSTORMid:165112date:2021-12-01T16:37:47
db:PACKETSTORMid:169105date:2021-08-28T19:12:00
db:PACKETSTORMid:169139date:2021-10-28T19:12:00
db:PACKETSTORMid:168127date:2022-08-22T16:02:30
db:PACKETSTORMid:167841date:2022-07-27T17:27:19
db:CNNVDid:CNNVD-202107-684date:2021-07-12T00:00:00
db:NVDid:CVE-2021-30640date:2021-07-12T15:15:08.367