CVE-2009-0580

Apache Tomcat <6.0.18 - Info Disclosure

Title source: llm

Description

Apache Tomcat 4.1.0 through 4.1.39, 5.5.0 through 5.5.27, and 6.0.0 through 6.0.18, when FORM authentication is used, allows remote attackers to enumerate valid usernames via requests to /j_security_check with malformed URL encoding of passwords, related to improper error checking in the (1) MemoryRealm, (2) DataSourceRealm, and (3) JDBCRealm authentication realms, as demonstrated by a % (percent) value for the j_password parameter.

Exploits (2)

exploitdb WRITEUP VERIFIED
by D. Matscheko · textremotemultiple
https://www.exploit-db.com/exploits/33023
metasploit SCANNER
rubypoc
https://github.com/rapid7/metasploit-framework/blob/master/modules/auxiliary/scanner/http/tomcat_enum.rb

Scores

EPSS 0.8817
EPSS Percentile 99.5%

Details

CWE
CWE-200
Status published
Products (48)
apache/tomcat 4.1.0
apache/tomcat 4.1.1
apache/tomcat 4.1.2
apache/tomcat 4.1.3 (2 CPE variants)
apache/tomcat 4.1.4
apache/tomcat 4.1.5
apache/tomcat 4.1.6
apache/tomcat 4.1.7
apache/tomcat 4.1.8
apache/tomcat 4.1.9 (2 CPE variants)
... and 38 more
Published Jun 05, 2009
Tracked Since Feb 18, 2026