The login method in LoginModule implementations in Apache Geronimo 2.0 does not throw FailedLoginException for failed logins, which allows remote attackers to bypass authentication requirements, deploy arbitrary modules, and gain administrative access by sending a blank username and password with the command line deployer in the deployment module.
                
            References
                    Configurations
                    History
                    21 Nov 2024, 00:35
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () http://geronimo.apache.org/2007/08/13/apache-geronimo-v20-release-delayed-due-to-security-issue.html - | |
| References | () http://geronimo.apache.org/2007/08/21/apache-geronimo-201-released.html - | |
| References | () http://www.nabble.com/Geronimo-2.0-Release-suspended-due-to-security-issue-found-before-release-t4263667s134.html - | |
| References | () https://issues.apache.org/jira/browse/GERONIMO-1201 - | |
| References | () https://issues.apache.org/jira/browse/GERONIMO-3404 - Patch | 
Information
                Published : 2007-08-27 23:17
Updated : 2025-04-09 00:30
NVD link : CVE-2007-4548
Mitre link : CVE-2007-4548
CVE.ORG link : CVE-2007-4548
JSON object : View
Products Affected
                apache
- geronimo
CWE
                
                    
                        
                        CWE-287
                        
            Improper Authentication
