A vulnerability in the JNDI Realm of Apache Tomcat allows an attacker to authenticate using variations of a valid user name and/or to bypass some of the protection provided by the LockOut Realm. This issue affects Apache Tomcat 10.0.0-M1 to 10.0.5; 9.0.0.M1 to 9.0.45; 8.5.0 to 8.5.65.
{
"versions": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.109"
},
{
"introduced": "8.5.0"
},
{
"fixed": "8.5.66"
},
{
"introduced": "9.0.0"
},
{
"fixed": "9.0.46"
},
{
"introduced": "10.0.0"
},
{
"fixed": "10.0.6"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
},
{
"introduced": "0"
},
{
"last_affected": "10.0"
},
{
"introduced": "0"
},
{
"last_affected": "11.0"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "1.14.0"
}
]
},
{
"events": [
{
"introduced": "8.0.0"
},
{
"last_affected": "8.5.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "12.0.0.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "20.1.0"
}
]
},
{
"events": [
{
"introduced": "7.4.0"
},
{
"last_affected": "7.7.1"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2021-30640.json"