Rapid7 Vulnerability & Exploit Database

Oracle Linux: CVE-2016-8745: ELSA-2017-0935: tomcat security update (MODERATE)

Free InsightVM Trial No Credit Card Necessary
2024 Attack Intel Report Latest research by Rapid7 Labs
Back to Search

Oracle Linux: CVE-2016-8745: ELSA-2017-0935: tomcat security update (MODERATE)

Severity
8
CVSS
(AV:N/AC:L/Au:N/C:C/I:N/A:N)
Published
12/12/2016
Created
07/25/2018
Added
03/18/2017
Modified
07/22/2024

Description

A bug in the error handling of the send file code for the NIO HTTP connector in Apache Tomcat 9.0.0.M1 to 9.0.0.M13, 8.5.0 to 8.5.8, 8.0.0.RC1 to 8.0.39, 7.0.0 to 7.0.73 and 6.0.16 to 6.0.48 resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage between requests including, not not limited to, session ID and the response body. The bug was first noticed in 8.5.x onwards where it appears the refactoring of the Connector code for 8.5.x onwards made it more likely that the bug was observed. Initially it was thought that the 8.5.x refactoring introduced the bug but further investigation has shown that the bug is present in all currently supported Tomcat versions. A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body.

Solution(s)

  • oracle-linux-upgrade-tomcat
  • oracle-linux-upgrade-tomcat-admin-webapps
  • oracle-linux-upgrade-tomcat-docs-webapp
  • oracle-linux-upgrade-tomcat-el-2-2-api
  • oracle-linux-upgrade-tomcat-javadoc
  • oracle-linux-upgrade-tomcat-jsp-2-2-api
  • oracle-linux-upgrade-tomcat-jsvc
  • oracle-linux-upgrade-tomcat-lib
  • oracle-linux-upgrade-tomcat-servlet-3-0-api
  • oracle-linux-upgrade-tomcat-webapps

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;