vulnerability
Red Hat: CVE-2016-6796: Low: tomcat security, bug fix, and enhancement update (RHSA-2017:2247)
Severity | CVSS | Published | Added | Modified |
---|---|---|---|---|
5 | (AV:N/AC:L/Au:N/C:N/I:P/A:N) | Nov 10, 2016 | Aug 3, 2017 | Sep 24, 2018 |
Severity
5
CVSS
(AV:N/AC:L/Au:N/C:N/I:P/A:N)
Published
Nov 10, 2016
Added
Aug 3, 2017
Modified
Sep 24, 2018
Description
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
Solution(s)
redhat-upgrade-tomcatredhat-upgrade-tomcat-admin-webappsredhat-upgrade-tomcat-docs-webappredhat-upgrade-tomcat-el-2-2-apiredhat-upgrade-tomcat-javadocredhat-upgrade-tomcat-jsp-2-2-apiredhat-upgrade-tomcat-jsvcredhat-upgrade-tomcat-libredhat-upgrade-tomcat-servlet-3-0-apiredhat-upgrade-tomcat-webapps
References
- BID-93944
- DEBIAN-DLA-728-1
- DEBIAN-DLA-729-1
- DEBIAN-DSA-3720
- DEBIAN-DSA-3721
- NVD-CVE-2016-6796
- REDHAT-RHSA-2017:0455
- REDHAT-RHSA-2017:0456
- REDHAT-RHSA-2017:0457
- REDHAT-RHSA-2017:1548
- REDHAT-RHSA-2017:1549
- REDHAT-RHSA-2017:1550
- REDHAT-RHSA-2017:1551
- REDHAT-RHSA-2017:1552
- REDHAT-RHSA-2017:2247
- SECTRACK-1037141
- SECTRACK-1038757
- UBUNTU-USN-3177-1

NEW
Explore Exposure Command
Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.