Lucene search

K
cve[email protected]CVE-2016-5018
HistoryAug 10, 2017 - 4:29 p.m.

CVE-2016-5018

2017-08-1016:29:00
web.nvd.nist.gov
206
apache tomcat
web application
security
bypass
vulnerability
cve-2016-5018

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

54.8%

In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.

Affected configurations

Vulners
NVD
Node
apache_software_foundationapache_strutsRange9.0.0.M19.0.0.M9
OR
apache_software_foundationapache_strutsRange8.5.08.5.4
OR
apache_software_foundationapache_strutsRange8.0.0.RC18.0.36
OR
apache_software_foundationapache_strutsRange7.0.07.0.70
OR
apache_software_foundationapache_strutsRange6.0.06.0.45
VendorProductVersionCPE
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone3::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone7::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone4::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone2::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone5::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone6::
apachetomcatcpe:/a:apache:tomcat::::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone8::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone9::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone1::

CNA Affected

[
  {
    "product": "Apache Tomcat",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "status": "affected",
        "version": "9.0.0.M1 to 9.0.0.M9"
      },
      {
        "status": "affected",
        "version": "8.5.0 to 8.5.4"
      },
      {
        "status": "affected",
        "version": "8.0.0.RC1 to 8.0.36"
      },
      {
        "status": "affected",
        "version": "7.0.0 to 7.0.70"
      },
      {
        "status": "affected",
        "version": "6.0.0 to 6.0.45"
      }
    ]
  }
]

References

CVSS2

6.4

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:P/A:N

CVSS3

9.1

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:N

AI Score

8.3

Confidence

High

EPSS

0.002

Percentile

54.8%