vulnerability
Amazon Linux AMI: CVE-2016-6816: Security patch for tomcat6 ((Multiple Advisories))
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
7 | (AV:N/AC:M/Au:N/C:P/I:P/A:P) | Dec 1, 2016 | Dec 16, 2016 | Jul 17, 2021 |
Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Dec 1, 2016
Added
Dec 16, 2016
Modified
Jul 17, 2021
Description
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.
Solution(s)
amazon-linux-upgrade-tomcat6amazon-linux-upgrade-tomcat7amazon-linux-upgrade-tomcat8
References
- REDHAT-RHSA-2017:0244
- REDHAT-RHSA-2017:0245
- REDHAT-RHSA-2017:0246
- REDHAT-RHSA-2017:0247
- REDHAT-RHSA-2017:0250
- REDHAT-RHSA-2017:0455
- REDHAT-RHSA-2017:0456
- REDHAT-RHSA-2017:0457
- REDHAT-RHSA-2017:0527
- REDHAT-RHSA-2017:0935
- AMAZON-ALAS-2017-810
- DEBIAN-DLA-728-1
- DEBIAN-DLA-729-1
- DEBIAN-DSA-3738
- DEBIAN-DSA-3739
- BID-94461
- SECTRACK-1037332
- NVD-CVE-2016-6816
- UBUNTU-USN-3177-1
- UBUNTU-USN-3177-2
- UBUNTU-USN-4557-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.