Vulnerability Description
SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username not contained in the database.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Geronimo | 2.0 |
Related Weaknesses (CWE)
References
- http://osvdb.org/38662
- http://secunia.com/advisories/27478
- http://secunia.com/advisories/27482Vendor Advisory
- http://www-1.ibm.com/support/docview.wss?uid=swg21286105
- http://www.securityfocus.com/bid/26287
- http://www.vupen.com/english/advisories/2007/3675
- http://www.vupen.com/english/advisories/2007/3676
- https://issues.apache.org/jira/browse/GERONIMO-3543
- http://osvdb.org/38662
- http://secunia.com/advisories/27478
- http://secunia.com/advisories/27482Vendor Advisory
- http://www-1.ibm.com/support/docview.wss?uid=swg21286105
- http://www.securityfocus.com/bid/26287
- http://www.vupen.com/english/advisories/2007/3675
- http://www.vupen.com/english/advisories/2007/3676
FAQ
What is CVE-2007-5797?
CVE-2007-5797 is a vulnerability with a CVSS score of 7.5 (HIGH). SQLLoginModule in Apache Geronimo 2.0 through 2.1 does not throw an exception for a nonexistent username, which allows remote attackers to bypass authentication via a login attempt with any username n...
How severe is CVE-2007-5797?
CVE-2007-5797 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2007-5797?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Geronimo.