Lucene search

K
cve[email protected]CVE-2016-6796
HistoryAug 11, 2017 - 2:29 a.m.

CVE-2016-6796

2017-08-1102:29:00
web.nvd.nist.gov
107
apache tomcat
securitymanager bypass
cve-2016-6796
nvd
jsp servlet

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

8.4

Confidence

High

EPSS

0.001

Percentile

46.8%

A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.

Affected configurations

Vulners
NVD
Node
apache_software_foundationapache_strutsRange9.0.0.M19.0.0.M9
OR
apache_software_foundationapache_strutsRange8.5.08.5.4
OR
apache_software_foundationapache_strutsRange8.0.0.RC18.0.36
OR
apache_software_foundationapache_strutsRange7.0.07.0.70
OR
apache_software_foundationapache_strutsRange6.0.06.0.45
VendorProductVersionCPE
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone8::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone5::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone2::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone3::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone6::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone7::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone4::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone1::
apachetomcatcpe:/a:apache:tomcat::::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone9::

CNA Affected

[
  {
    "product": "Apache Tomcat",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "status": "affected",
        "version": "9.0.0.M1 to 9.0.0.M9"
      },
      {
        "status": "affected",
        "version": "8.5.0 to 8.5.4"
      },
      {
        "status": "affected",
        "version": "8.0.0.RC1 to 8.0.36"
      },
      {
        "status": "affected",
        "version": "7.0.0 to 7.0.70"
      },
      {
        "status": "affected",
        "version": "6.0.0 to 6.0.45"
      }
    ]
  }
]

References

CVSS2

5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

NONE

Integrity Impact

PARTIAL

Availability Impact

NONE

AV:N/AC:L/Au:N/C:N/I:P/A:N

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

NONE

Integrity Impact

HIGH

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:H/A:N

AI Score

8.4

Confidence

High

EPSS

0.001

Percentile

46.8%