Lucene search

K
cve[email protected]CVE-2016-8735
HistoryApr 06, 2017 - 9:59 p.m.

CVE-2016-8735

2017-04-0621:59:00
web.nvd.nist.gov
740
In Wild
4
apache tomcat
remote code execution
cve-2016-8735
jmxremotelifecyclelistener
nvd

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.737

Percentile

98.2%

Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn’t updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.

Affected configurations

Vulners
NVD
Node
apache_software_foundationapache_strutsRange6.0.48
VendorProductVersionCPE
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone3::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone7::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone4::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone2::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone5::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:-::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone6::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone8::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone11::
apachetomcat9.0.0cpe:/a:apache:tomcat:9.0.0:milestone10::
Rows per page:
1-10 of 121

CNA Affected

[
  {
    "product": "Apache Tomcat",
    "vendor": "Apache Software Foundation",
    "versions": [
      {
        "status": "affected",
        "version": "before 6.0.48"
      },
      {
        "status": "affected",
        "version": "7.x before 7.0.73"
      },
      {
        "status": "affected",
        "version": "8.x before 8.0.39"
      },
      {
        "status": "affected",
        "version": "8.5.x before 8.5.7"
      },
      {
        "status": "affected",
        "version": "9.x before 9.0.0.M12"
      }
    ]
  }
]

References

Social References

More

CVSS2

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

PARTIAL

Availability Impact

PARTIAL

AV:N/AC:L/Au:N/C:P/I:P/A:P

CVSS3

9.8

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

HIGH

Availability Impact

HIGH

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H

AI Score

8

Confidence

High

EPSS

0.737

Percentile

98.2%