ID DOMINO_SWG21992835.NASL Type nessus Reporter This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof. Modified 2021-01-02T00:00:00
Description
According to its banner, the version of IBM Domino (formerly IBM
Lotus Domino) running on the remote host is 8.5.x prior to 8.5.3 Fix
Pack 6 (FP6) Interim Fix 15 (IF15) or 9.0.x prior to 9.0.1 Fix Pack 7
(FP7) Interim Fix 1 (IF1). It is, therefore, affected by the following
vulnerabilities :
Multiple cross-site scripting (XSS) vulnerabilities
exist in the iNotes component due to improper validation
of user-supplied input. An authenticated, remote
attacker can exploit these, via a specially crafted
request, to execute arbitrary script code in a user's
browser session. (CVE-2016-0282, CVE-2016-5880)
Multiple cross-site scripting (XSS) vulnerabilities
exist in the iNotes component due to improper validation
of user-supplied input. An unauthenticated, remote
attacker can exploit these, via a specially crafted
request, to execute arbitrary script code in a user's
browser session. (CVE-2016-2938, CVE-2016-2939,
CVE-2016-5881, CVE-2016-5882, CVE-2016-6113,
CVE-2016-5884)
A denial of service vulnerability exists in the Apache
Commons FileUpload component due to improper handling of
boundaries in content-type headers when handling file
upload requests. An unauthenticated, remote attacker can
exploit this to cause processes linked against the
library to become unresponsive. (CVE-2016-3092)
#
# (C) Tenable Network Security, Inc.
#
include("compat.inc");
if (description)
{
script_id(95882);
script_version("1.7");
script_cvs_date("Date: 2019/11/13");
script_cve_id(
"CVE-2016-0282",
"CVE-2016-2938",
"CVE-2016-2939",
"CVE-2016-3092",
"CVE-2016-5880",
"CVE-2016-5881",
"CVE-2016-5882",
"CVE-2016-5884",
"CVE-2016-6113"
);
script_bugtraq_id(
91453,
94558,
94600,
94602,
94603,
94604,
94605,
94606
);
script_name(english:"IBM Domino 8.5.x < 8.5.3 Fix Pack 6 Interim Fix 15 / 9.0.x < 9.0.1 Fix Pack 7 Interim Fix 1 Multiple Vulnerabilities");
script_summary(english:"Checks the version of IBM Domino.");
script_set_attribute(attribute:"synopsis", value:
"A business collaboration application running on the remote host is
affected by multiple vulnerabilities.");
script_set_attribute(attribute:"description", value:
"According to its banner, the version of IBM Domino (formerly IBM
Lotus Domino) running on the remote host is 8.5.x prior to 8.5.3 Fix
Pack 6 (FP6) Interim Fix 15 (IF15) or 9.0.x prior to 9.0.1 Fix Pack 7
(FP7) Interim Fix 1 (IF1). It is, therefore, affected by the following
vulnerabilities :
- Multiple cross-site scripting (XSS) vulnerabilities
exist in the iNotes component due to improper validation
of user-supplied input. An authenticated, remote
attacker can exploit these, via a specially crafted
request, to execute arbitrary script code in a user's
browser session. (CVE-2016-0282, CVE-2016-5880)
- Multiple cross-site scripting (XSS) vulnerabilities
exist in the iNotes component due to improper validation
of user-supplied input. An unauthenticated, remote
attacker can exploit these, via a specially crafted
request, to execute arbitrary script code in a user's
browser session. (CVE-2016-2938, CVE-2016-2939,
CVE-2016-5881, CVE-2016-5882, CVE-2016-6113,
CVE-2016-5884)
- A denial of service vulnerability exists in the Apache
Commons FileUpload component due to improper handling of
boundaries in content-type headers when handling file
upload requests. An unauthenticated, remote attacker can
exploit this to cause processes linked against the
library to become unresponsive. (CVE-2016-3092)");
script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg21992835");
script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg21663874");
script_set_attribute(attribute:"see_also", value:"https://www-01.ibm.com/support/docview.wss?uid=swg21657963");
script_set_attribute(attribute:"solution", value:
"Upgrade to IBM Domino version 8.5.3 Fix Pack 6 (FP6) Interim Fix 15
(IF15) / 9.0.1 Fix Pack 7 (FP7) Interim Fix 1 (IF1) or later.");
script_set_cvss_base_vector("CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N");
script_set_cvss_temporal_vector("CVSS2#E:U/RL:OF/RC:C");
script_set_cvss3_base_vector("CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N");
script_set_cvss3_temporal_vector("CVSS:3.0/E:U/RL:O/RC:C");
script_set_attribute(attribute:"cvss_score_source", value:"CVE-2016-6113");
script_set_attribute(attribute:"exploitability_ease", value:"No known exploits are available");
script_set_attribute(attribute:"exploit_available", value:"false");
script_set_attribute(attribute:"vuln_publication_date", value:"2016/06/21");
script_set_attribute(attribute:"patch_publication_date", value:"2016/11/02");
script_set_attribute(attribute:"plugin_publication_date", value:"2016/12/15");
script_set_attribute(attribute:"potential_vulnerability", value:"true");
script_set_attribute(attribute:"plugin_type", value:"remote");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:lotus_domino");
script_set_attribute(attribute:"cpe", value:"cpe:/a:ibm:domino");
script_end_attributes();
script_category(ACT_GATHER_INFO);
script_family(english:"Misc.");
script_copyright(english:"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
script_dependencies("domino_installed.nasl");
script_require_keys("Domino/Version", "Settings/ParanoidReport");
exit(0);
}
include("audit.inc");
include("global_settings.inc");
include("misc_func.inc");
include("install_func.inc");
app_name = "IBM Domino";
ver = get_kb_item_or_exit("Domino/Version");
port = get_kb_item("Domino/Version_provided_by_port");
if (!port) port = 0;
version = NULL;
fix = NULL;
fix_ver = NULL;
fix_pack = NULL;
hotfix = NULL;
# IBM may provide custom hotfixes to customers, which we have no way
# to check for, so this plugin should be paranoid
if (report_paranoia < 2) audit(AUDIT_PARANOID);
if (ver == UNKNOWN_VER) audit(AUDIT_UNKNOWN_APP_VER, app_name);
# Ensure sufficient granularity
if (ver !~ "^(\d+\.){1,}\d+.*$") audit(AUDIT_VER_NOT_GRANULAR, app_name, port, ver);
# Check for 8.5 / 8.5.0 / 8.5.1 / 8.5.2 / 8.5.3
if (ver =~ "^8\.5(($|[^0-9])|\.[0-3]($|[^0-9]))")
{
fix = "8.5.3 FP6 IF15";
fix_ver = "8.5.3";
fix_pack = 6;
hotfix = 2876;
}
# Check for 9.0 / 9.0.0 / 9.0.1
else if (ver =~ "^9\.0(($|[^0-9])|\.[0-1]($|[^0-9]))")
{
fix = "9.0.1 FP7 IF1";
fix_ver = "9.0.1";
fix_pack = 7;
hotfix = 92;
}
else audit(AUDIT_LISTEN_NOT_VULN, app_name, port, ver);
# Breakdown the version into components.
version = eregmatch(string:ver, pattern:"^((?:\d+\.){1,}\d+)(?: FP(\d+))?(?: HF(\d+))?$");
if (isnull(version)) audit(AUDIT_UNKNOWN_APP_VER, app_name);
# Use 0 as a placeholder if no FP or HF. Version number itself was
# checked for in the granularity check.
if (!version[2]) version[2] = 0;
else version[2] = int(version[2]);
if (!version[3]) version[3] = 0;
else version[3] = int(version[3]);
# Compare current to fix and report as needed.
if (
ver_compare(ver:version[1], fix:fix_ver, strict:FALSE) == -1 ||
(ver_compare(ver:version[1], fix:fix_ver, strict:FALSE) == 0 && version[2] < fix_pack) ||
(ver_compare(ver:version[1], fix:fix_ver, strict:FALSE) == 0 && version[2] == fix_pack && version[3] < hotfix)
)
{
security_report_v4(
xss:TRUE,
port:port,
severity:SECURITY_WARNING,
extra:
'\n' +
'\n Installed version : ' + ver +
'\n Fixed version : ' + fix +
'\n'
);
}
else audit(AUDIT_LISTEN_NOT_VULN, app_name, port, ver);
{"id": "DOMINO_SWG21992835.NASL", "bulletinFamily": "scanner", "title": "IBM Domino 8.5.x < 8.5.3 Fix Pack 6 Interim Fix 15 / 9.0.x < 9.0.1 Fix Pack 7 Interim Fix 1 Multiple Vulnerabilities", "description": "According to its banner, the version of IBM Domino (formerly IBM\nLotus Domino) running on the remote host is 8.5.x prior to 8.5.3 Fix\nPack 6 (FP6) Interim Fix 15 (IF15) or 9.0.x prior to 9.0.1 Fix Pack 7\n(FP7) Interim Fix 1 (IF1). It is, therefore, affected by the following\nvulnerabilities :\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist in the iNotes component due to improper validation\n of user-supplied input. An authenticated, remote\n attacker can exploit these, via a specially crafted\n request, to execute arbitrary script code in a user's\n browser session. (CVE-2016-0282, CVE-2016-5880)\n \n - Multiple cross-site scripting (XSS) vulnerabilities\n exist in the iNotes component due to improper validation\n of user-supplied input. An unauthenticated, remote\n attacker can exploit these, via a specially crafted\n request, to execute arbitrary script code in a user's\n browser session. (CVE-2016-2938, CVE-2016-2939,\n CVE-2016-5881, CVE-2016-5882, CVE-2016-6113,\n CVE-2016-5884)\n\n - A denial of service vulnerability exists in the Apache\n Commons FileUpload component due to improper handling of\n boundaries in content-type headers when handling file\n upload requests. An unauthenticated, remote attacker can\n exploit this to cause processes linked against the\n library to become unresponsive. (CVE-2016-3092)", "published": "2016-12-15T00:00:00", "modified": "2021-01-02T00:00:00", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "href": "https://www.tenable.com/plugins/nessus/95882", "reporter": "This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.", "references": ["https://www-01.ibm.com/support/docview.wss?uid=swg21663874", "https://www-01.ibm.com/support/docview.wss?uid=swg21992835", "https://www-01.ibm.com/support/docview.wss?uid=swg21657963"], "cvelist": ["CVE-2016-5881", "CVE-2016-2939", "CVE-2016-3092", "CVE-2016-5882", "CVE-2016-2938", "CVE-2016-5880", "CVE-2016-5884", "CVE-2016-0282", "CVE-2016-6113"], "type": "nessus", "lastseen": "2021-01-01T01:57:07", "edition": 29, "viewCount": 176, "enchantments": {"dependencies": {"references": [{"type": "cve", "idList": ["CVE-2016-5882", "CVE-2016-5881", "CVE-2016-5884", "CVE-2016-2938", "CVE-2016-0282", "CVE-2016-3092", "CVE-2016-2939", "CVE-2016-5880", "CVE-2016-6113"]}, {"type": "f5", "idList": ["SOL82392041", "F5:K82392041"]}, {"type": "myhack58", "idList": ["MYHACK58:62201787046"]}, {"type": "nessus", "idList": ["UBUNTU_USN-3027-1.NASL", "REDHAT-RHSA-2016-2069.NASL", "WEBSPHERE_547999.NASL", "DEBIAN_DLA-528.NASL", "FREEBSD_PKG_CBCEEB493BC711E68E82002590263BF5.NASL", "TOMCAT_7_0_70.NASL", "ALA_ALAS-2016-736.NASL", "FEDORA_2016-2B0C16FD82.NASL", "FEDORA_2016-0A4DCCDD23.NASL", "DEBIAN_DSA-3611.NASL"]}, {"type": "redhat", "idList": ["RHSA-2016:2072", "RHSA-2016:2069", "RHSA-2017:0457", "RHSA-2017:0455", "RHSA-2016:2807", "RHSA-2016:2071", "RHSA-2016:2068", "RHSA-2016:2808", "RHSA-2016:2599", "RHSA-2016:2070"]}, {"type": "freebsd", "idList": ["CBCEEB49-3BC7-11E6-8E82-002590263BF5", "61B8C359-4AAB-11E6-A7BD-14DAE9D210B8"]}, {"type": "jvn", "idList": ["JVN:89379547"]}, {"type": "amazon", "idList": ["ALAS-2016-736"]}, {"type": "openvas", "idList": ["OPENVAS:1361412562310808197", "OPENVAS:1361412562310809211", "OPENVAS:1361412562310120725", "OPENVAS:1361412562310871961", "OPENVAS:1361412562310842824", "OPENVAS:1361412562310808618", "OPENVAS:1361412562310703611", "OPENVAS:703611", "OPENVAS:703614", "OPENVAS:1361412562310703614"]}, {"type": "atlassian", "idList": ["ATLASSIAN:JRA-61885", "ATLASSIAN:JRASERVER-61885", "ATLASSIAN:BSERV-8977"]}, {"type": "debian", "idList": ["DEBIAN:DLA-529-1:DC84D", "DEBIAN:DLA-528-1:BE307", "DEBIAN:DSA-3614-1:AC7F6", "DEBIAN:DSA-3609-1:174EB", "DEBIAN:DSA-3611-1:F53EF"]}, {"type": "ubuntu", "idList": ["USN-3027-1", "USN-3024-1"]}, {"type": "github", "idList": ["GHSA-FVM3-CFVJ-GXQQ"]}, {"type": "fedora", "idList": ["FEDORA:CF0AC608B5E3", "FEDORA:44AA5603A529", "FEDORA:77E4F6087EA4"]}, {"type": "centos", "idList": ["CESA-2016:2599"]}, {"type": "oraclelinux", "idList": ["ELSA-2016-2599"]}, {"type": "cloudfoundry", "idList": ["CFOUNDRY:1DFE9585B9C1AAABE38F2402F4352EFD"]}, {"type": "suse", "idList": ["SUSE-SU-2017:1660-1"]}, {"type": "gentoo", "idList": ["GLSA-201705-09"]}], "modified": "2021-01-01T01:57:07", "rev": 2}, "score": {"value": 7.5, "vector": "NONE", "modified": "2021-01-01T01:57:07", "rev": 2}, "vulnersScore": 7.5}, "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(95882);\n script_version(\"1.7\");\n script_cvs_date(\"Date: 2019/11/13\");\n\n script_cve_id(\n \"CVE-2016-0282\",\n \"CVE-2016-2938\",\n \"CVE-2016-2939\",\n \"CVE-2016-3092\",\n \"CVE-2016-5880\",\n \"CVE-2016-5881\",\n \"CVE-2016-5882\",\n \"CVE-2016-5884\",\n \"CVE-2016-6113\"\n );\n script_bugtraq_id(\n 91453,\n 94558,\n 94600,\n 94602,\n 94603,\n 94604,\n 94605,\n 94606\n );\n\n script_name(english:\"IBM Domino 8.5.x < 8.5.3 Fix Pack 6 Interim Fix 15 / 9.0.x < 9.0.1 Fix Pack 7 Interim Fix 1 Multiple Vulnerabilities\");\n script_summary(english:\"Checks the version of IBM Domino.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"A business collaboration application running on the remote host is\naffected by multiple vulnerabilities.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its banner, the version of IBM Domino (formerly IBM\nLotus Domino) running on the remote host is 8.5.x prior to 8.5.3 Fix\nPack 6 (FP6) Interim Fix 15 (IF15) or 9.0.x prior to 9.0.1 Fix Pack 7\n(FP7) Interim Fix 1 (IF1). It is, therefore, affected by the following\nvulnerabilities :\n\n - Multiple cross-site scripting (XSS) vulnerabilities\n exist in the iNotes component due to improper validation\n of user-supplied input. An authenticated, remote\n attacker can exploit these, via a specially crafted\n request, to execute arbitrary script code in a user's\n browser session. (CVE-2016-0282, CVE-2016-5880)\n \n - Multiple cross-site scripting (XSS) vulnerabilities\n exist in the iNotes component due to improper validation\n of user-supplied input. An unauthenticated, remote\n attacker can exploit these, via a specially crafted\n request, to execute arbitrary script code in a user's\n browser session. (CVE-2016-2938, CVE-2016-2939,\n CVE-2016-5881, CVE-2016-5882, CVE-2016-6113,\n CVE-2016-5884)\n\n - A denial of service vulnerability exists in the Apache\n Commons FileUpload component due to improper handling of\n boundaries in content-type headers when handling file\n upload requests. An unauthenticated, remote attacker can\n exploit this to cause processes linked against the\n library to become unresponsive. (CVE-2016-3092)\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www-01.ibm.com/support/docview.wss?uid=swg21992835\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www-01.ibm.com/support/docview.wss?uid=swg21663874\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www-01.ibm.com/support/docview.wss?uid=swg21657963\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to IBM Domino version 8.5.3 Fix Pack 6 (FP6) Interim Fix 15\n(IF15) / 9.0.1 Fix Pack 7 (FP7) Interim Fix 1 (IF1) or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-6113\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/11/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/12/15\");\n\n script_set_attribute(attribute:\"potential_vulnerability\", value:\"true\");\n script_set_attribute(attribute:\"plugin_type\", value:\"remote\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ibm:lotus_domino\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ibm:domino\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Misc.\");\n\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"domino_installed.nasl\");\n script_require_keys(\"Domino/Version\", \"Settings/ParanoidReport\");\n\n exit(0);\n}\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"install_func.inc\");\n\napp_name = \"IBM Domino\";\nver = get_kb_item_or_exit(\"Domino/Version\");\nport = get_kb_item(\"Domino/Version_provided_by_port\");\nif (!port) port = 0;\nversion = NULL;\nfix = NULL;\nfix_ver = NULL;\nfix_pack = NULL;\nhotfix = NULL;\n\n# IBM may provide custom hotfixes to customers, which we have no way\n# to check for, so this plugin should be paranoid\nif (report_paranoia < 2) audit(AUDIT_PARANOID);\n\nif (ver == UNKNOWN_VER) audit(AUDIT_UNKNOWN_APP_VER, app_name);\n\n# Ensure sufficient granularity\nif (ver !~ \"^(\\d+\\.){1,}\\d+.*$\") audit(AUDIT_VER_NOT_GRANULAR, app_name, port, ver);\n\n# Check for 8.5 / 8.5.0 / 8.5.1 / 8.5.2 / 8.5.3\nif (ver =~ \"^8\\.5(($|[^0-9])|\\.[0-3]($|[^0-9]))\")\n{\n fix = \"8.5.3 FP6 IF15\";\n fix_ver = \"8.5.3\";\n fix_pack = 6;\n hotfix = 2876;\n}\n# Check for 9.0 / 9.0.0 / 9.0.1\nelse if (ver =~ \"^9\\.0(($|[^0-9])|\\.[0-1]($|[^0-9]))\")\n{\n fix = \"9.0.1 FP7 IF1\";\n fix_ver = \"9.0.1\";\n fix_pack = 7;\n hotfix = 92;\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, app_name, port, ver);\n\n# Breakdown the version into components.\nversion = eregmatch(string:ver, pattern:\"^((?:\\d+\\.){1,}\\d+)(?: FP(\\d+))?(?: HF(\\d+))?$\");\nif (isnull(version)) audit(AUDIT_UNKNOWN_APP_VER, app_name);\n\n# Use 0 as a placeholder if no FP or HF. Version number itself was\n# checked for in the granularity check.\nif (!version[2]) version[2] = 0;\nelse version[2] = int(version[2]);\nif (!version[3]) version[3] = 0;\nelse version[3] = int(version[3]);\n\n# Compare current to fix and report as needed.\nif (\n ver_compare(ver:version[1], fix:fix_ver, strict:FALSE) == -1 ||\n (ver_compare(ver:version[1], fix:fix_ver, strict:FALSE) == 0 && version[2] < fix_pack) ||\n (ver_compare(ver:version[1], fix:fix_ver, strict:FALSE) == 0 && version[2] == fix_pack && version[3] < hotfix)\n)\n{\n security_report_v4(\n xss:TRUE,\n port:port,\n severity:SECURITY_WARNING,\n extra:\n '\\n' +\n '\\n Installed version : ' + ver +\n '\\n Fixed version : ' + fix +\n '\\n'\n );\n}\nelse audit(AUDIT_LISTEN_NOT_VULN, app_name, port, ver);\n", "naslFamily": "Misc.", "pluginID": "95882", "cpe": ["cpe:/a:ibm:lotus_domino", "cpe:/a:ibm:domino"], "scheme": null, "cvss3": {"score": 6.1, "vector": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}}
{"cve": [{"lastseen": "2020-10-03T12:10:47", "description": "IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", "edition": 3, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-02-01T20:59:00", "title": "CVE-2016-5882", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5882"], "modified": "2017-07-28T01:29:00", "cpe": ["cpe:/a:ibm:domino:8.5.2.0", "cpe:/a:ibm:domino:9.0.1.6", "cpe:/a:ibm:inotes:8.5.1.1", "cpe:/a:ibm:inotes:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.4", "cpe:/a:ibm:inotes:9.0.1.5", "cpe:/a:ibm:inotes:8.5.2.1", "cpe:/a:ibm:inotes:9.0.1.0", "cpe:/a:ibm:inotes:8.5.1.0", "cpe:/a:ibm:domino:8.5.3.3", "cpe:/a:ibm:domino:8.5.2.2", "cpe:/a:ibm:inotes:8.5.3.3", "cpe:/a:ibm:inotes:9.0.1.6", "cpe:/a:ibm:inotes:9.0.1.1", "cpe:/a:ibm:domino:8.5.3.6", "cpe:/a:ibm:domino:8.5.1.1", "cpe:/a:ibm:domino:9.0.1.5", "cpe:/a:ibm:inotes:9.0.1.3", "cpe:/a:ibm:domino:9.0.1.0", "cpe:/a:ibm:domino:8.5.3.5", "cpe:/a:ibm:inotes:8.5.3.0", "cpe:/a:ibm:domino:8.5.1.4", "cpe:/a:ibm:inotes:8.5.1.3", "cpe:/a:ibm:domino:8.5.1.3", "cpe:/a:ibm:domino:9.0.1.4", "cpe:/a:ibm:inotes:8.5.2.2", "cpe:/a:ibm:domino:8.5.1.2", "cpe:/a:ibm:domino:8.5.3.0", "cpe:/a:ibm:domino:8.5.2.1", "cpe:/a:ibm:domino:9.0.1.2", "cpe:/a:ibm:inotes:8.5.1.2", "cpe:/a:ibm:domino:9.0.1.1", "cpe:/a:ibm:domino:8.5.1.0", "cpe:/a:ibm:domino:9.0.1.3", "cpe:/a:ibm:inotes:8.5.3.6", "cpe:/a:ibm:domino:9.0.0.0", "cpe:/a:ibm:domino:8.5.3.4", "cpe:/a:ibm:inotes:8.5.3.4", "cpe:/a:ibm:inotes:8.5.2.0", "cpe:/a:ibm:inotes:8.5.3.1", "cpe:/a:ibm:domino:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.2", "cpe:/a:ibm:domino:8.5.2.4", "cpe:/a:ibm:inotes:9.0.0.0", "cpe:/a:ibm:inotes:8.5.1.4", "cpe:/a:ibm:domino:8.5.1.5", "cpe:/a:ibm:inotes:8.5.1.5", "cpe:/a:ibm:inotes:8.5.2.3", "cpe:/a:ibm:domino:8.5.2.3", "cpe:/a:ibm:inotes:8.5.3.5", "cpe:/a:ibm:domino:8.5.3.1"], "id": "CVE-2016-5882", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5882", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:10:47", "description": "IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", "edition": 3, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-02-01T22:59:00", "title": "CVE-2016-5881", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5881"], "modified": "2017-07-27T01:29:00", "cpe": ["cpe:/a:ibm:inotes:8.5.1.1", "cpe:/a:ibm:inotes:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.4", "cpe:/a:ibm:inotes:9.0.1.5", "cpe:/a:ibm:inotes:8.5.2.1", "cpe:/a:ibm:inotes:9.0.1.0", "cpe:/a:ibm:inotes:8.5.1.0", "cpe:/a:ibm:inotes:8.5.3.3", "cpe:/a:ibm:inotes:9.0.1.6", "cpe:/a:ibm:inotes:9.0.1.1", "cpe:/a:ibm:inotes:9.0.1.3", "cpe:/a:ibm:inotes:8.5.3.0", "cpe:/a:ibm:inotes:8.5.1.3", "cpe:/a:ibm:inotes:8.5.2.2", "cpe:/a:ibm:inotes:8.5.1.2", "cpe:/a:ibm:inotes:8.5.3.6", "cpe:/a:ibm:inotes:8.5.3.4", "cpe:/a:ibm:inotes:8.5.2.0", "cpe:/a:ibm:inotes:8.5.3.1", "cpe:/a:ibm:inotes:9.0.1.2", "cpe:/a:ibm:inotes:9.0.0.0", "cpe:/a:ibm:inotes:8.5.1.4", "cpe:/a:ibm:inotes:8.5.1.5", "cpe:/a:ibm:inotes:8.5.2.3", "cpe:/a:ibm:inotes:8.5.3.5"], "id": "CVE-2016-5881", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5881", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:10:47", "description": "IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", "edition": 3, "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.4, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-02-01T20:59:00", "title": "CVE-2016-5880", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5880"], "modified": "2017-07-28T01:29:00", "cpe": ["cpe:/a:ibm:domino:8.5.2.0", "cpe:/a:ibm:domino:9.0.1.6", "cpe:/a:ibm:inotes:8.5.1.1", "cpe:/a:ibm:inotes:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.4", "cpe:/a:ibm:inotes:9.0.1.5", "cpe:/a:ibm:inotes:8.5.2.1", "cpe:/a:ibm:inotes:9.0.1.0", "cpe:/a:ibm:inotes:8.5.1.0", "cpe:/a:ibm:domino:8.5.3.3", "cpe:/a:ibm:domino:8.5.2.2", "cpe:/a:ibm:inotes:8.5.3.3", "cpe:/a:ibm:inotes:9.0.1.6", "cpe:/a:ibm:inotes:9.0.1.1", "cpe:/a:ibm:domino:8.5.3.6", "cpe:/a:ibm:domino:8.5.1.1", "cpe:/a:ibm:domino:9.0.1.5", "cpe:/a:ibm:inotes:9.0.1.3", "cpe:/a:ibm:domino:9.0.1.0", "cpe:/a:ibm:domino:8.5.3.5", "cpe:/a:ibm:inotes:8.5.3.0", "cpe:/a:ibm:domino:8.5.1.4", "cpe:/a:ibm:inotes:8.5.1.3", "cpe:/a:ibm:domino:8.5.1.3", "cpe:/a:ibm:domino:9.0.1.4", "cpe:/a:ibm:inotes:8.5.2.2", "cpe:/a:ibm:domino:8.5.1.2", "cpe:/a:ibm:domino:8.5.3.0", "cpe:/a:ibm:domino:8.5.2.1", "cpe:/a:ibm:domino:9.0.1.2", "cpe:/a:ibm:inotes:8.5.1.2", "cpe:/a:ibm:domino:9.0.1.1", "cpe:/a:ibm:domino:8.5.1.0", "cpe:/a:ibm:domino:9.0.1.3", "cpe:/a:ibm:inotes:8.5.3.6", "cpe:/a:ibm:domino:9.0.0.0", "cpe:/a:ibm:domino:8.5.3.4", "cpe:/a:ibm:inotes:8.5.3.4", "cpe:/a:ibm:inotes:8.5.2.0", "cpe:/a:ibm:inotes:8.5.3.1", "cpe:/a:ibm:domino:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.2", "cpe:/a:ibm:domino:8.5.2.4", "cpe:/a:ibm:inotes:9.0.0.0", "cpe:/a:ibm:inotes:8.5.1.4", "cpe:/a:ibm:domino:8.5.1.5", "cpe:/a:ibm:inotes:8.5.1.5", "cpe:/a:ibm:inotes:8.5.2.3", "cpe:/a:ibm:domino:8.5.2.3", "cpe:/a:ibm:inotes:8.5.3.5", "cpe:/a:ibm:domino:8.5.3.1"], "id": "CVE-2016-5880", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5880", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:10:47", "description": "IBM Verse is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", "edition": 3, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-02-01T20:59:00", "title": "CVE-2016-6113", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-6113"], "modified": "2017-07-28T01:29:00", "cpe": ["cpe:/a:ibm:domino:8.5.2.0", "cpe:/a:ibm:domino:9.0.1.6", "cpe:/a:ibm:inotes:8.5.1.1", "cpe:/a:ibm:inotes:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.4", "cpe:/a:ibm:inotes:9.0.1.5", "cpe:/a:ibm:inotes:8.5.2.1", "cpe:/a:ibm:inotes:9.0.1.0", "cpe:/a:ibm:inotes:8.5.1.0", "cpe:/a:ibm:domino:8.5.3.3", "cpe:/a:ibm:domino:8.5.2.2", "cpe:/a:ibm:inotes:8.5.3.3", "cpe:/a:ibm:inotes:9.0.1.6", "cpe:/a:ibm:inotes:9.0.1.1", "cpe:/a:ibm:domino:8.5.3.6", "cpe:/a:ibm:domino:8.5.1.1", "cpe:/a:ibm:domino:9.0.1.5", "cpe:/a:ibm:inotes:9.0.1.3", "cpe:/a:ibm:domino:9.0.1.0", "cpe:/a:ibm:domino:8.5.3.5", "cpe:/a:ibm:inotes:8.5.3.0", "cpe:/a:ibm:domino:8.5.1.4", "cpe:/a:ibm:inotes:8.5.1.3", "cpe:/a:ibm:domino:8.5.1.3", "cpe:/a:ibm:domino:9.0.1.4", "cpe:/a:ibm:inotes:8.5.2.2", "cpe:/a:ibm:domino:8.5.1.2", "cpe:/a:ibm:domino:8.5.3.0", "cpe:/a:ibm:domino:8.5.2.1", "cpe:/a:ibm:domino:9.0.1.2", "cpe:/a:ibm:inotes:8.5.1.2", "cpe:/a:ibm:domino:9.0.1.1", "cpe:/a:ibm:domino:8.5.1.0", "cpe:/a:ibm:domino:9.0.1.3", "cpe:/a:ibm:inotes:8.5.3.6", "cpe:/a:ibm:domino:9.0.0.0", "cpe:/a:ibm:domino:8.5.3.4", "cpe:/a:ibm:inotes:8.5.3.4", "cpe:/a:ibm:inotes:8.5.2.0", "cpe:/a:ibm:inotes:8.5.3.1", "cpe:/a:ibm:domino:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.2", "cpe:/a:ibm:domino:8.5.2.4", "cpe:/a:ibm:inotes:9.0.0.0", "cpe:/a:ibm:inotes:8.5.1.4", "cpe:/a:ibm:domino:8.5.1.5", "cpe:/a:ibm:inotes:8.5.1.5", "cpe:/a:ibm:inotes:8.5.2.3", "cpe:/a:ibm:domino:8.5.2.3", "cpe:/a:ibm:inotes:8.5.3.5", "cpe:/a:ibm:domino:8.5.3.1"], "id": "CVE-2016-6113", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-6113", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:10:47", "description": "IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", "edition": 3, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-02-01T20:59:00", "title": "CVE-2016-5884", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-5884"], "modified": "2017-07-28T01:29:00", "cpe": ["cpe:/a:ibm:domino:8.5.2.0", "cpe:/a:ibm:domino:9.0.1.6", "cpe:/a:ibm:inotes:8.5.1.1", "cpe:/a:ibm:inotes:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.4", "cpe:/a:ibm:inotes:9.0.1.5", "cpe:/a:ibm:inotes:8.5.2.1", "cpe:/a:ibm:inotes:9.0.1.0", "cpe:/a:ibm:inotes:8.5.1.0", "cpe:/a:ibm:domino:8.5.3.3", "cpe:/a:ibm:domino:8.5.2.2", "cpe:/a:ibm:inotes:8.5.3.3", "cpe:/a:ibm:inotes:9.0.1.6", "cpe:/a:ibm:inotes:9.0.1.1", "cpe:/a:ibm:domino:8.5.3.6", "cpe:/a:ibm:domino:8.5.1.1", "cpe:/a:ibm:domino:9.0.1.5", "cpe:/a:ibm:inotes:9.0.1.3", "cpe:/a:ibm:domino:9.0.1.0", "cpe:/a:ibm:domino:8.5.3.5", "cpe:/a:ibm:inotes:8.5.3.0", "cpe:/a:ibm:domino:8.5.1.4", "cpe:/a:ibm:inotes:8.5.1.3", "cpe:/a:ibm:domino:8.5.1.3", "cpe:/a:ibm:domino:9.0.1.4", "cpe:/a:ibm:inotes:8.5.2.2", "cpe:/a:ibm:domino:8.5.1.2", "cpe:/a:ibm:domino:8.5.3.0", "cpe:/a:ibm:domino:8.5.2.1", "cpe:/a:ibm:domino:9.0.1.2", "cpe:/a:ibm:inotes:8.5.1.2", "cpe:/a:ibm:domino:9.0.1.1", "cpe:/a:ibm:domino:8.5.1.0", "cpe:/a:ibm:domino:9.0.1.3", "cpe:/a:ibm:inotes:8.5.3.6", "cpe:/a:ibm:domino:9.0.0.0", "cpe:/a:ibm:domino:8.5.3.4", "cpe:/a:ibm:inotes:8.5.3.4", "cpe:/a:ibm:inotes:8.5.2.0", "cpe:/a:ibm:inotes:8.5.3.1", "cpe:/a:ibm:domino:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.2", "cpe:/a:ibm:domino:8.5.2.4", "cpe:/a:ibm:inotes:9.0.0.0", "cpe:/a:ibm:inotes:8.5.1.4", "cpe:/a:ibm:domino:8.5.1.5", "cpe:/a:ibm:inotes:8.5.1.5", "cpe:/a:ibm:inotes:8.5.2.3", "cpe:/a:ibm:domino:8.5.2.3", "cpe:/a:ibm:inotes:8.5.3.5", "cpe:/a:ibm:domino:8.5.3.1"], "id": "CVE-2016-5884", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-5884", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:10:38", "description": "Cross-site scripting (XSS) vulnerability in IBM iNotes before 8.5.3 FP6 IF2 allows remote authenticated users to inject arbitrary web script or HTML via a crafted URL, aka SPR KLYHAAHNUS.", "edition": 3, "cvss3": {"exploitabilityScore": 2.3, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 5.4, "privilegesRequired": "LOW", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:L/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2016-11-24T19:59:00", "title": "CVE-2016-0282", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "LOW", "exploitabilityScore": 6.8, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 3.5, "vectorString": "AV:N/AC:M/Au:S/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "SINGLE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-0282"], "modified": "2017-07-28T01:29:00", "cpe": ["cpe:/a:ibm:lotus_inotes:8.5.2.2", "cpe:/a:ibm:lotus_inotes:8.5.3.6", "cpe:/a:ibm:lotus_inotes:8.5.0.1", "cpe:/a:ibm:lotus_inotes:8.5.2.3", "cpe:/a:ibm:lotus_inotes:8.5.1.4", "cpe:/a:ibm:lotus_inotes:8.5.2.0", "cpe:/a:ibm:lotus_inotes:8.5.1.1", "cpe:/a:ibm:lotus_inotes:8.5.3.0", "cpe:/a:ibm:lotus_inotes:8.5.2.1", "cpe:/a:ibm:lotus_inotes:8.5.1.3", "cpe:/a:ibm:lotus_inotes:8.5.2.4", "cpe:/a:ibm:lotus_inotes:8.5.3.3", "cpe:/a:ibm:lotus_inotes:8.5.3.2", "cpe:/a:ibm:lotus_inotes:8.5.1.2", "cpe:/a:ibm:lotus_inotes:8.5.3.1", "cpe:/a:ibm:lotus_inotes:8.5.0.0", "cpe:/a:ibm:lotus_inotes:8.5.3.4", "cpe:/a:ibm:lotus_inotes:8.5.3.5", "cpe:/a:ibm:lotus_inotes:8.5.1.5", "cpe:/a:ibm:lotus_inotes:8.5.1.0"], "id": "CVE-2016-0282", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-0282", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ibm:lotus_inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:lotus_inotes:8.5.3.0:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:10:44", "description": "IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", "edition": 3, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-02-01T20:59:00", "title": "CVE-2016-2939", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2939"], "modified": "2017-07-28T01:29:00", "cpe": ["cpe:/a:ibm:domino:8.5.2.0", "cpe:/a:ibm:domino:9.0.1.6", "cpe:/a:ibm:inotes:8.5.1.1", "cpe:/a:ibm:inotes:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.4", "cpe:/a:ibm:inotes:9.0.1.5", "cpe:/a:ibm:inotes:8.5.2.1", "cpe:/a:ibm:inotes:9.0.1.0", "cpe:/a:ibm:inotes:8.5.1.0", "cpe:/a:ibm:domino:8.5.3.3", "cpe:/a:ibm:domino:8.5.2.2", "cpe:/a:ibm:inotes:8.5.3.3", "cpe:/a:ibm:inotes:9.0.1.6", "cpe:/a:ibm:inotes:9.0.1.1", "cpe:/a:ibm:domino:8.5.3.6", "cpe:/a:ibm:domino:8.5.1.1", "cpe:/a:ibm:domino:9.0.1.5", "cpe:/a:ibm:inotes:9.0.1.3", "cpe:/a:ibm:domino:9.0.1.0", "cpe:/a:ibm:domino:8.5.3.5", "cpe:/a:ibm:inotes:8.5.3.0", "cpe:/a:ibm:domino:8.5.1.4", "cpe:/a:ibm:inotes:8.5.1.3", "cpe:/a:ibm:domino:8.5.1.3", "cpe:/a:ibm:domino:9.0.1.4", "cpe:/a:ibm:inotes:8.5.2.2", "cpe:/a:ibm:domino:8.5.1.2", "cpe:/a:ibm:domino:8.5.3.0", "cpe:/a:ibm:domino:8.5.2.1", "cpe:/a:ibm:domino:9.0.1.2", "cpe:/a:ibm:inotes:8.5.1.2", "cpe:/a:ibm:domino:9.0.1.1", "cpe:/a:ibm:domino:8.5.1.0", "cpe:/a:ibm:domino:9.0.1.3", "cpe:/a:ibm:inotes:8.5.3.6", "cpe:/a:ibm:domino:9.0.0.0", "cpe:/a:ibm:domino:8.5.3.4", "cpe:/a:ibm:inotes:8.5.3.4", "cpe:/a:ibm:inotes:8.5.2.0", "cpe:/a:ibm:inotes:8.5.3.1", "cpe:/a:ibm:domino:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.2", "cpe:/a:ibm:domino:8.5.2.4", "cpe:/a:ibm:inotes:9.0.0.0", "cpe:/a:ibm:inotes:8.5.1.4", "cpe:/a:ibm:domino:8.5.1.5", "cpe:/a:ibm:inotes:8.5.1.5", "cpe:/a:ibm:inotes:8.5.2.3", "cpe:/a:ibm:domino:8.5.2.3", "cpe:/a:ibm:inotes:8.5.3.5", "cpe:/a:ibm:domino:8.5.3.1"], "id": "CVE-2016-2939", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2939", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-10-03T12:10:44", "description": "IBM iNotes is vulnerable to cross-site scripting. This vulnerability allows users to embed arbitrary JavaScript code in the Web UI thus altering the intended functionality potentially leading to credentials disclosure within a trusted session.", "edition": 3, "cvss3": {"exploitabilityScore": 2.8, "cvssV3": {"baseSeverity": "MEDIUM", "confidentialityImpact": "LOW", "attackComplexity": "LOW", "scope": "CHANGED", "attackVector": "NETWORK", "availabilityImpact": "NONE", "integrityImpact": "LOW", "baseScore": 6.1, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N", "userInteraction": "REQUIRED", "version": "3.0"}, "impactScore": 2.7}, "published": "2017-02-01T20:59:00", "title": "CVE-2016-2938", "type": "cve", "cwe": ["CWE-79"], "bulletinFamily": "NVD", "cvss2": {"severity": "MEDIUM", "exploitabilityScore": 8.6, "obtainAllPrivilege": false, "userInteractionRequired": true, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "MEDIUM", "confidentialityImpact": "NONE", "availabilityImpact": "NONE", "integrityImpact": "PARTIAL", "baseScore": 4.3, "vectorString": "AV:N/AC:M/Au:N/C:N/I:P/A:N", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 2.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-2938"], "modified": "2017-07-28T01:29:00", "cpe": ["cpe:/a:ibm:domino:8.5.2.0", "cpe:/a:ibm:domino:9.0.1.6", "cpe:/a:ibm:inotes:8.5.1.1", "cpe:/a:ibm:inotes:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.4", "cpe:/a:ibm:inotes:9.0.1.5", "cpe:/a:ibm:inotes:8.5.2.1", "cpe:/a:ibm:inotes:9.0.1.0", "cpe:/a:ibm:inotes:8.5.1.0", "cpe:/a:ibm:domino:8.5.3.3", "cpe:/a:ibm:domino:8.5.2.2", "cpe:/a:ibm:inotes:8.5.3.3", "cpe:/a:ibm:inotes:9.0.1.6", "cpe:/a:ibm:inotes:9.0.1.1", "cpe:/a:ibm:domino:8.5.3.6", "cpe:/a:ibm:domino:8.5.1.1", "cpe:/a:ibm:domino:9.0.1.5", "cpe:/a:ibm:inotes:9.0.1.3", "cpe:/a:ibm:domino:9.0.1.0", "cpe:/a:ibm:domino:8.5.3.5", "cpe:/a:ibm:inotes:8.5.3.0", "cpe:/a:ibm:domino:8.5.1.4", "cpe:/a:ibm:inotes:8.5.1.3", "cpe:/a:ibm:domino:8.5.1.3", "cpe:/a:ibm:domino:9.0.1.4", "cpe:/a:ibm:inotes:8.5.2.2", "cpe:/a:ibm:domino:8.5.1.2", "cpe:/a:ibm:domino:8.5.3.0", "cpe:/a:ibm:domino:8.5.2.1", "cpe:/a:ibm:domino:9.0.1.2", "cpe:/a:ibm:inotes:8.5.1.2", "cpe:/a:ibm:domino:9.0.1.1", "cpe:/a:ibm:domino:8.5.1.0", "cpe:/a:ibm:domino:9.0.1.3", "cpe:/a:ibm:inotes:8.5.3.6", "cpe:/a:ibm:domino:9.0.0.0", "cpe:/a:ibm:domino:8.5.3.4", "cpe:/a:ibm:inotes:8.5.3.4", "cpe:/a:ibm:inotes:8.5.2.0", "cpe:/a:ibm:inotes:8.5.3.1", "cpe:/a:ibm:domino:8.5.3.2", "cpe:/a:ibm:inotes:9.0.1.2", "cpe:/a:ibm:domino:8.5.2.4", "cpe:/a:ibm:inotes:9.0.0.0", "cpe:/a:ibm:inotes:8.5.1.4", "cpe:/a:ibm:domino:8.5.1.5", "cpe:/a:ibm:inotes:8.5.1.5", "cpe:/a:ibm:inotes:8.5.2.3", "cpe:/a:ibm:domino:8.5.2.3", "cpe:/a:ibm:inotes:8.5.3.5", "cpe:/a:ibm:domino:8.5.3.1"], "id": "CVE-2016-2938", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-2938", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}, "cpe23": ["cpe:2.3:a:ibm:domino:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.1.2:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.5:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.2.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.2.1:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:9.0.1.6:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:inotes:8.5.1.4:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:9.0.1.3:*:*:*:*:*:*:*", "cpe:2.3:a:ibm:domino:8.5.3.4:*:*:*:*:*:*:*"]}, {"lastseen": "2020-12-09T20:07:37", "description": "The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.", "edition": 7, "cvss3": {"exploitabilityScore": 3.9, "cvssV3": {"baseSeverity": "HIGH", "confidentialityImpact": "NONE", "attackComplexity": "LOW", "scope": "UNCHANGED", "attackVector": "NETWORK", "availabilityImpact": "HIGH", "integrityImpact": "NONE", "baseScore": 7.5, "privilegesRequired": "NONE", "vectorString": "CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H", "userInteraction": "NONE", "version": "3.0"}, "impactScore": 3.6}, "published": "2016-07-04T22:59:00", "title": "CVE-2016-3092", "type": "cve", "cwe": ["CWE-20"], "bulletinFamily": "NVD", "cvss2": {"severity": "HIGH", "exploitabilityScore": 10.0, "obtainAllPrivilege": false, "userInteractionRequired": false, "obtainOtherPrivilege": false, "cvssV2": {"accessComplexity": "LOW", "confidentialityImpact": "NONE", "availabilityImpact": "COMPLETE", "integrityImpact": "NONE", "baseScore": 7.8, "vectorString": "AV:N/AC:L/Au:N/C:N/I:N/A:C", "version": "2.0", "accessVector": "NETWORK", "authentication": "NONE"}, "impactScore": 6.9, "obtainUserPrivilege": false}, "cvelist": ["CVE-2016-3092"], "modified": "2019-04-23T19:29:00", "cpe": ["cpe:/a:apache:tomcat:7.0.11", "cpe:/a:apache:tomcat:8.0.26", "cpe:/a:apache:tomcat:8.0.32", "cpe:/a:apache:tomcat:7.0.50", "cpe:/a:apache:tomcat:8.0.17", "cpe:/a:apache:tomcat:7.0.63", "cpe:/a:apache:tomcat:7.0.40", "cpe:/a:apache:tomcat:7.0.35", "cpe:/a:apache:tomcat:7.0.29", "cpe:/a:apache:tomcat:7.0.54", "cpe:/a:apache:tomcat:8.0.30", "cpe:/a:apache:tomcat:7.0.52", "cpe:/a:apache:tomcat:7.0.42", "cpe:/a:apache:tomcat:7.0.16", "cpe:/a:apache:tomcat:9.0.0", "cpe:/a:apache:tomcat:7.0.32", "cpe:/a:apache:tomcat:7.0.41", "cpe:/o:debian:debian_linux:8.0", "cpe:/a:apache:tomcat:7.0.4", "cpe:/o:canonical:ubuntu_linux:12.04", "cpe:/a:apache:tomcat:8.0.3", "cpe:/a:apache:tomcat:8.0.0", "cpe:/a:apache:tomcat:8.0.33", "cpe:/o:canonical:ubuntu_linux:16.04", "cpe:/a:apache:tomcat:7.0.23", "cpe:/a:apache:commons_fileupload:1.3.1", "cpe:/a:apache:tomcat:8.0.27", "cpe:/a:apache:tomcat:7.0.37", "cpe:/a:apache:tomcat:8.0.28", "cpe:/a:apache:tomcat:7.0.20", "cpe:/a:apache:tomcat:8.0.12", "cpe:/a:apache:tomcat:7.0.28", "cpe:/a:apache:tomcat:7.0.27", "cpe:/a:apache:tomcat:8.5.2", "cpe:/o:canonical:ubuntu_linux:15.10", "cpe:/a:apache:tomcat:8.0.18", "cpe:/a:hp:icewall_sso_agent_option:10.0", "cpe:/a:apache:tomcat:8.0.8", "cpe:/a:apache:tomcat:7.0.0", "cpe:/a:apache:tomcat:7.0.2", "cpe:/a:apache:tomcat:7.0.25", "cpe:/a:apache:tomcat:7.0.61", "cpe:/a:apache:tomcat:7.0.69", "cpe:/a:apache:tomcat:8.0.5", "cpe:/a:apache:tomcat:7.0.12", "cpe:/a:apache:tomcat:7.0.59", "cpe:/a:apache:tomcat:7.0.30", "cpe:/a:apache:tomcat:7.0.22", "cpe:/a:apache:tomcat:7.0.26", "cpe:/a:apache:tomcat:7.0.56", "cpe:/a:apache:tomcat:7.0.65", "cpe:/a:apache:tomcat:7.0.19", "cpe:/a:apache:tomcat:8.0.35", "cpe:/a:apache:tomcat:7.0.33", "cpe:/a:apache:tomcat:8.0.15", "cpe:/a:apache:tomcat:8.5.0", "cpe:/a:apache:tomcat:7.0.55", "cpe:/a:apache:tomcat:7.0.5", "cpe:/a:apache:tomcat:8.0.14", "cpe:/a:apache:tomcat:7.0.53", "cpe:/a:apache:tomcat:8.0.11", "cpe:/a:apache:tomcat:7.0.39", "cpe:/a:apache:tomcat:8.0.29", "cpe:/a:apache:tomcat:7.0.1", "cpe:/a:apache:tomcat:7.0.8", "cpe:/a:apache:tomcat:7.0.64", "cpe:/a:apache:tomcat:7.0.47", "cpe:/a:apache:tomcat:7.0.34", "cpe:/a:apache:tomcat:8.0.20", "cpe:/a:apache:tomcat:7.0.62", "cpe:/a:apache:tomcat:7.0.6", "cpe:/a:apache:tomcat:7.0.14", "cpe:/a:apache:tomcat:7.0.21", "cpe:/a:apache:tomcat:7.0.68", "cpe:/a:apache:tomcat:8.0.24", "cpe:/a:apache:tomcat:8.0.23", "cpe:/a:apache:tomcat:7.0.67", "cpe:/a:apache:tomcat:7.0.57", "cpe:/a:hp:icewall_identity_manager:5.0", "cpe:/a:apache:tomcat:7.0.10", "cpe:/a:apache:tomcat:8.0.1", "cpe:/a:apache:tomcat:8.0.21", "cpe:/o:canonical:ubuntu_linux:14.04", "cpe:/a:apache:tomcat:8.0.22"], "id": "CVE-2016-3092", "href": "https://web.nvd.nist.gov/view/vuln/detail?vulnId=CVE-2016-3092", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}, "cpe23": ["cpe:2.3:a:apache:tomcat:7.0.8:*:*:*:*:*:*:*", "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.5:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:m6:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.4:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.8:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.68:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:hp:icewall_identity_manager:5.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.30:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.5.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.67:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:*", "cpe:2.3:a:hp:icewall_sso_agent_option:10.0:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:m1:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:m4:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.5:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.2:*:*:*:*:*:*:*", "cpe:2.3:a:apache:commons_fileupload:1.3.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:9.0.0:m3:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.33:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.69:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.1:*:*:*:*:*:*:*", "cpe:2.3:a:apache:tomcat:8.0.0:rc2:*:*:*:*:*:*", "cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:*", "cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:*"]}], "f5": [{"lastseen": "2017-06-08T00:16:36", "bulletinFamily": "software", "cvelist": ["CVE-2016-3092"], "edition": 1, "description": "\nF5 Product Development has evaluated the currently supported releases for potential vulnerability.\n\nTo determine if your release is known to be vulnerable, the components or features that are affected by the vulnerability, and for information about releases or hotfixes that address the vulnerability, refer to the following table:\n\nProduct| Versions known to be vulnerable| Versions known to be not vulnerable| Severity| Vulnerable component or feature \n---|---|---|---|--- \nBIG-IP LTM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP AAM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP AFM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP Analytics| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1| Not vulnerable| None \nBIG-IP APM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP ASM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP DNS| None| 12.0.0 - 12.1.0| Not vulnerable| None \nBIG-IP Edge Gateway| None| 11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP GTM| None| 11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP Link Controller| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1 \n11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP PEM| None| 12.0.0 - 12.1.0 \n11.4.0 - 11.6.1| Not vulnerable| None \nBIG-IP PSM| None| 11.4.0 - 11.4.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP WebAccelerator| None| 11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nBIG-IP WOM| None| 11.2.1 \n10.2.1 - 10.2.4| Not vulnerable| None \nARX| None| 6.2.0 - 6.4.0| Not vulnerable| None \nEnterprise Manager| None| 3.1.1| Not vulnerable| None \nFirePass| None| 7.0.0| Not vulnerable| None \nBIG-IQ Cloud| None| 4.0.0 - 4.5.0| Not vulnerable| None \nBIG-IQ Device| None| 4.2.0 - 4.5.0| Not vulnerable| None \nBIG-IQ Security| None| 4.0.0 - 4.5.0| Not vulnerable| None \nBIG-IQ ADC| None| 4.5.0| Not vulnerable| None \nBIG-IQ Centralized Management| None| 5.0.0 \n4.6.0| Not vulnerable| None \nBIG-IQ Cloud and Orchestration| None| 1.0.0| Not vulnerable| None \nF5 iWorkflow| None| 2.0.0| Not vulnerable| None \nLineRate| None| 2.5.0 - 2.6.1| Not vulnerable| None \nF5 MobileSafe| None| 1.0.0| Not vulnerable| None \nF5 WebSafe| None| 1.0.0| Not vulnerable| None \nTraffix SDC| None| 5.0.0 \n4.0.0 - 4.4.0| Not vulnerable| None\n\nNone\n\n * [K9970: Subscribing to email notifications regarding F5 products](<https://support.f5.com/csp/article/K9970>)\n * [K9957: Creating a custom RSS feed to view new and updated documents](<https://support.f5.com/csp/article/K9957>)\n * [K4602: Overview of the F5 security vulnerability response policy](<https://support.f5.com/csp/article/K4602>)\n * [K4918: Overview of the F5 critical issue hotfix policy](<https://support.f5.com/csp/article/K4918>)\n", "modified": "2016-07-19T22:32:00", "published": "2016-07-19T22:32:00", "href": "https://support.f5.com/csp/article/K82392041", "id": "F5:K82392041", "title": "Apache Commons FileUpload vulnerability CVE-2016-3092", "type": "f5", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2016-09-26T17:23:06", "bulletinFamily": "software", "cvelist": ["CVE-2016-3092"], "edition": 1, "description": "Vulnerability Recommended Actions\n\nNone\n\nSupplemental Information\n\n * SOL9970: Subscribing to email notifications regarding F5 products\n * SOL9957: Creating a custom RSS feed to view new and updated documents\n * SOL4602: Overview of the F5 security vulnerability response policy\n * SOL4918: Overview of the F5 critical issue hotfix policy\n", "modified": "2016-07-19T00:00:00", "published": "2016-07-19T00:00:00", "id": "SOL82392041", "href": "http://support.f5.com/kb/en-us/solutions/public/k/82/sol82392041.html", "type": "f5", "title": "SOL82392041 - Apache Commons FileUpload vulnerability CVE-2016-3092", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "myhack58": [{"lastseen": "2017-06-15T16:18:49", "bulletinFamily": "info", "cvelist": ["CVE-2016-3092"], "edition": 1, "description": "Last year the commons-fileupload official announcements Commons Fileupload of a security vulnerability CVE-2016-3092, in the Commons FileUpload 1.3.2 repair. <http://commons.apache.org/proper/commons-fileupload/security-reports.html> because at that time the security components use the Commons FileUpload 1.3.1 release, so with a bit of this vulnerability. Shortly before seeing the Prophet community@offline small octopus dumplings, for this vulnerability the vulnerability is analysed only know CVE-2016-3092 vulnerability reason is that when the boundary is too long,BufSize length is insufficient,significantly reducing the performance and code complexity of the algorithm. The following was the follow-up process.\n\n##Vulnerability:## program to use the Commons Fileupload 1.3.1 components, a malicious user can send a carefully constructed request to make the server a denial of service. File upload when modify boundary of length close to 4096 bytes,the server will take more time than the boundray is a few dozen bytes. Later after comparison found boundray size close to 4096 when the Commons FileUpload 1.3.1 and Commons FileUpload 1.3.2 version is not much different, when boundray is much larger than the 4096 when the Commons FileUpload 1.3.1 performance problems occur.\n\n##Vulnerability:## diff1 try to repair the large boundray problems <https://github.com/apache/commons-fileupload/commit/612d9106bd08a3c2a537badb20451121be9b64cf>! [](/Article/UploadPic/2017-6/2017615112226546. png)\n\nThis from the repair results, Commons FileUpload 1.3.2 increasing the bufSize the length of the, also confirmed, CVE-201 6-3092 vulnerability reason is that when the boundary is too long, BufSize length is insufficient, significantly reducing the performance and code complexity of the algorithm for the conclusion.\n\nFirst do not discuss vulnerability, from the code perspective, commons-fileupload1. 3. 1 version is to put these assignment logic in the security check logic before the code is as follows:\n\n\nthis. input = input; this. bufSize = bufSize; this. buffer = new byte[bufSize]; this. notifier = pNotifier; this. boundaryLength = boundary. length + BOUNDARY_PREFIX. length; if(bufSize < this. boundaryLength + 1) { throw new IllegalArgumentException(\"The buffer size specified for the MultipartStream is too small\");\n} else {\n\n**[1] [[2]](<87046_2.htm>) [[3]](<87046_3.htm>) [next](<87046_2.htm>)**\n", "modified": "2017-06-15T00:00:00", "published": "2017-06-15T00:00:00", "href": "http://www.myhack58.com/Article/html/3/62/2017/87046.htm", "id": "MYHACK58:62201787046", "title": "Apache Commons Fileupload 1.3.1 DOS(CVE-2016-3092)-vulnerability warning-the black bar safety net", "type": "myhack58", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "nessus": [{"lastseen": "2020-12-01T15:30:10", "description": "The IBM WebSphere Application Server running on the remote host is version 7.0.0.x prior to 7.0.0.43, 8.0.0.x prior to\n8.0.0.13, 8.5.0.x prior to 8.5.5.11 or 9.0.x prior to 9.0.0.1. It is, therefore, affected by a denial of service\nvulnerability in the Apache Commons FileUpload subcomponent. An unauthenticated, remote attacker can exploit this, by\nsending file upload requests, in order to cause the server to become unresponsive.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.", "edition": 3, "cvss3": {"score": 6.1, "vector": "AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N"}, "published": "2020-10-23T00:00:00", "title": "IBM WebSphere Application Server 7.0.0.x < 7.0.0.43 / 8.0.0.x < 8.0.0.13 / 8.5.x < 8.5.5.11 / 9.0.x < 9.0.0.1 FileUpload DoS (CVE-2016-3092)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092", "CVE-2017-1503"], "modified": "2020-10-23T00:00:00", "cpe": ["cpe:/a:ibm:websphere_application_server"], "id": "WEBSPHERE_547999.NASL", "href": "https://www.tenable.com/plugins/nessus/141850", "sourceData": "##\n# (C) Tenable Network Security, Inc.\n##\n\ninclude('compat.inc');\n\nif (description)\n{\n script_id(141850);\n script_version(\"1.3\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/11/30\");\n\n script_cve_id(\"CVE-2017-1503\");\n\n script_name(english:\"IBM WebSphere Application Server 7.0.0.x < 7.0.0.43 / 8.0.0.x < 8.0.0.13 / 8.5.x < 8.5.5.11 / 9.0.x < 9.0.0.1 FileUpload DoS (CVE-2016-3092)\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote web application server is affected by a denial of service vulnerability\");\n script_set_attribute(attribute:\"description\", value:\n\"The IBM WebSphere Application Server running on the remote host is version 7.0.0.x prior to 7.0.0.43, 8.0.0.x prior to\n8.0.0.13, 8.5.0.x prior to 8.5.5.11 or 9.0.x prior to 9.0.0.1. It is, therefore, affected by a denial of service\nvulnerability in the Apache Commons FileUpload subcomponent. An unauthenticated, remote attacker can exploit this, by\nsending file upload requests, in order to cause the server to become unresponsive.\n\nNote that Nessus has not tested for this issue but has instead relied only on the application's self-reported version\nnumber.\");\n script_set_attribute(attribute:\"see_also\", value:\"https://www.ibm.com/support/pages/node/547999\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to IBM WebSphere Application Server 7.0.0.43, 8.0.0.13, 8.5.5.11, 9.0.0.1, or later. Alternatively, upgrade to\nthe minimal fix pack levels required by the interim fix and then apply Interim Fixes PI65218 and PI65853.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:M/Au:N/C:N/I:P/A:N\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:N\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2017-1503\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/08/23\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/23\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2020/10/23\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"agent\", value:\"all\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:ibm:websphere_application_server\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Web Servers\");\n\n script_copyright(english:\"This script is Copyright (C) 2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"websphere_detect.nasl\", \"ibm_enum_products.nbin\", \"ibm_websphere_application_server_nix_installed.nbin\");\n script_require_keys(\"installed_sw/IBM WebSphere Application Server\");\n\n exit(0);\n}\n\ninclude('vcf.inc');\n\napp = 'IBM WebSphere Application Server';\n\napp_info = vcf::combined_get_app_info(app:app);\nvcf::check_granularity(app_info:app_info, sig_segments:4);\n\n# If the detection is only remote, Source will be set, and we should require paranoia\nif (!empty_or_null(app_info['Source']) && app_info['Source'] != 'unknown' && report_paranoia < 2)\n audit(AUDIT_PARANOID);\n\nif (app_info['version'] =~ \"^7\\.\")\n{\n fix = 'Interim Fix PI65218';\n if ('PI65218' >< app_info['Fixes'])\n audit(AUDIT_INST_VER_NOT_VULN, app);\n\n}\nelse\n{\n fix = 'Interim Fix PI65218 and PI65853';\n if ('PI65218' >< app_info['Fixes'] && 'PI65853' >< app_info['Fixes'])\n audit(AUDIT_INST_VER_NOT_VULN, app);\n}\n\nconstraints = [\n {'min_version':'7.0.0.0', 'max_version':'7.0.0.41', 'fixed_version':'7.0.0.43 or ' + fix},\n {'min_version':'8.0.0.0', 'max_version':'8.0.0.12', 'fixed_version':'8.0.0.13'},\n {'min_version':'8.5.0.0', 'max_version':'8.5.5.10', 'fixed_version':'8.5.5.11 or ' + fix},\n {'min_version':'9.0.0.0', 'max_version':'9.0.0.0', 'fixed_version':'9.0.0.1 or ' + fix}\n];\n\nvcf::check_version_and_report(\n app_info:app_info,\n constraints:constraints,\n severity:SECURITY_WARNING\n);\n", "cvss": {"score": 4.3, "vector": "AV:N/AC:M/Au:N/C:N/I:P/A:N"}}, {"lastseen": "2021-01-12T09:43:52", "description": "A denial of service vulnerability was identified in Commons FileUpload\nthat occurred when the length of the multipart boundary was just below\nthe size of the buffer (4096 bytes) used to read the uploaded file.\nThis caused the file upload process to take several orders of\nmagnitude longer than if the boundary was the typical tens of bytes\nlong.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.2.2-1+deb7u3.\n\nWe recommend that you upgrade your libcommons-fileupload-java\npackages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.", "edition": 17, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-06-27T00:00:00", "title": "Debian DLA-528-1 : libcommons-fileupload-java security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2016-06-27T00:00:00", "cpe": ["p-cpe:/a:debian:debian_linux:libcommons-fileupload-java", "p-cpe:/a:debian:debian_linux:libcommons-fileupload-java-doc", "cpe:/o:debian:debian_linux:7.0"], "id": "DEBIAN_DLA-528.NASL", "href": "https://www.tenable.com/plugins/nessus/91834", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Debian Security Advisory DLA-528-1. The text\n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91834);\n script_version(\"2.6\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-3092\");\n\n script_name(english:\"Debian DLA-528-1 : libcommons-fileupload-java security update\");\n script_summary(english:\"Checks dpkg output for the updated packages.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A denial of service vulnerability was identified in Commons FileUpload\nthat occurred when the length of the multipart boundary was just below\nthe size of the buffer (4096 bytes) used to read the uploaded file.\nThis caused the file upload process to take several orders of\nmagnitude longer than if the boundary was the typical tens of bytes\nlong.\n\nFor Debian 7 'Wheezy', these problems have been fixed in version\n1.2.2-1+deb7u3.\n\nWe recommend that you upgrade your libcommons-fileupload-java\npackages.\n\nNOTE: Tenable Network Security has extracted the preceding description\nblock directly from the DLA security advisory. Tenable has attempted\nto automatically clean and format it as much as possible without\nintroducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://lists.debian.org/debian-lts-announce/2016/06/msg00029.html\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/wheezy/libcommons-fileupload-java\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Upgrade the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcommons-fileupload-java\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:libcommons-fileupload-java-doc\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:7.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/26\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/06/27\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"7.0\", prefix:\"libcommons-fileupload-java\", reference:\"1.2.2-1+deb7u3\")) flag++;\nif (deb_check(release:\"7.0\", prefix:\"libcommons-fileupload-java-doc\", reference:\"1.2.2-1+deb7u3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-09-14T19:09:31", "description": "According to its self-reported version number, the Apache Tomcat\ninstance listening on the remote host is 7.0.x prior to 7.0.70,\n8.0.x < 8.0.36, 8.5.x < 8.5.3 or 9.0.x < 9.0.0.M8. It is,\ntherefore, affected by a denial of service vulnerability:\n\n - A denial of service vulnerability was identified in\n Commons FileUpload that occurred when the length of the\n multipart boundary was just below the size of the buffer\n (4096 bytes) used to read the uploaded file if the\n boundary was the typical tens of bytes long.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.", "edition": 11, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2019-01-11T00:00:00", "title": "Apache Tomcat 7.0.x < 7.0.70 / 8.0.x < 8.0.36 / 8.5.x < 8.5.3 / 9.0.x < 9.0.0.M8 Denial of Service", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2019-01-11T00:00:00", "cpe": ["cpe:/a:apache:tomcat"], "id": "TOMCAT_7_0_70.NASL", "href": "https://www.tenable.com/plugins/nessus/121119", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(121119);\n script_version(\"1.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2020/03/11\");\n\n script_cve_id(\"CVE-2016-3092\");\n\n script_name(english:\"Apache Tomcat 7.0.x < 7.0.70 / 8.0.x < 8.0.36 / 8.5.x < 8.5.3 / 9.0.x < 9.0.0.M8 Denial of Service\");\n script_summary(english:\"Checks the Apache Tomcat version.\");\n\n script_set_attribute(attribute:\"synopsis\", value:\n\"The remote Apache Tomcat server is affected by a \ndenial of service vulnerability.\");\n script_set_attribute(attribute:\"description\", value:\n\"According to its self-reported version number, the Apache Tomcat\ninstance listening on the remote host is 7.0.x prior to 7.0.70,\n8.0.x < 8.0.36, 8.5.x < 8.5.3 or 9.0.x < 9.0.0.M8. It is,\ntherefore, affected by a denial of service vulnerability:\n\n - A denial of service vulnerability was identified in\n Commons FileUpload that occurred when the length of the\n multipart boundary was just below the size of the buffer\n (4096 bytes) used to read the uploaded file if the\n boundary was the typical tens of bytes long.\n\nNote that Nessus has not tested for these issues but has instead\nrelied only on the application's self-reported version number.\");\n script_set_attribute(attribute:\"see_also\", value:\"http://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.70\");\n # http://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.3_and_8.0.36\n script_set_attribute(attribute:\"see_also\", value:\"http://www.nessus.org/u?ecb3da27\");\n script_set_attribute(attribute:\"see_also\", value:\"http://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M8\");\n script_set_attribute(attribute:\"solution\", value:\n\"Upgrade to Apache Tomcat version 7.0.70 / 8.0.36 / 8.5.3 / 9.0.0.M8 or later.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"cvss_score_source\", value:\"CVE-2016-3092\");\n\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/03/10\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/06/20\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2019/01/11\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"combined\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/a:apache:tomcat\");\n script_set_attribute(attribute:\"agent\", value:\"all\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_family(english:\"Web Servers\");\n\n script_copyright(english:\"This script is Copyright (C) 2019-2020 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n\n script_dependencies(\"tomcat_error_version.nasl\", \"tomcat_win_installed.nbin\", \"apache_tomcat_nix_installed.nbin\");\n script_require_keys(\"installed_sw/Apache Tomcat\");\n\n\n exit(0);\n}\n\ninclude(\"tomcat_version.inc\");\n\ntomcat_check_version(fixed:make_list(\"7.0.70\", \"8.0.36\", \"8.5.3\", \"9.0.0.M8\"), severity:SECURITY_HOLE, granularity_regex:\"^(7(\\.0)?|8(\\.(0|5))?|9(\\.0)?)$\");\n\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-01T01:19:24", "description": "A denial of service vulnerability was identified in Commons FileUpload\nthat occurred when the length of the multipart boundary was just below\nthe size of the buffer (4096 bytes) used to read the uploaded file if\nthe boundary was the typical tens of bytes long.", "edition": 24, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-08-18T00:00:00", "title": "Amazon Linux AMI : tomcat7 / tomcat8 (ALAS-2016-736)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:amazon:linux:tomcat7-docs-webapp", "p-cpe:/a:amazon:linux:tomcat7-servlet-3.0-api", "p-cpe:/a:amazon:linux:tomcat8-docs-webapp", "p-cpe:/a:amazon:linux:tomcat8-log4j", "p-cpe:/a:amazon:linux:tomcat7-log4j", "p-cpe:/a:amazon:linux:tomcat7-el-2.2-api", "p-cpe:/a:amazon:linux:tomcat7-lib", "p-cpe:/a:amazon:linux:tomcat8", "p-cpe:/a:amazon:linux:tomcat8-jsp-2.3-api", "p-cpe:/a:amazon:linux:tomcat8-el-3.0-api", "p-cpe:/a:amazon:linux:tomcat7", "p-cpe:/a:amazon:linux:tomcat7-jsp-2.2-api", "p-cpe:/a:amazon:linux:tomcat8-javadoc", "p-cpe:/a:amazon:linux:tomcat7-javadoc", "p-cpe:/a:amazon:linux:tomcat8-admin-webapps", "p-cpe:/a:amazon:linux:tomcat8-webapps", "p-cpe:/a:amazon:linux:tomcat7-admin-webapps", "p-cpe:/a:amazon:linux:tomcat7-webapps", "p-cpe:/a:amazon:linux:tomcat8-servlet-3.1-api", "cpe:/o:amazon:linux", "p-cpe:/a:amazon:linux:tomcat8-lib"], "id": "ALA_ALAS-2016-736.NASL", "href": "https://www.tenable.com/plugins/nessus/93014", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were\n# extracted from Amazon Linux AMI Security Advisory ALAS-2016-736.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(93014);\n script_version(\"2.3\");\n script_cvs_date(\"Date: 2018/04/18 15:09:36\");\n\n script_cve_id(\"CVE-2016-3092\");\n script_xref(name:\"ALAS\", value:\"2016-736\");\n\n script_name(english:\"Amazon Linux AMI : tomcat7 / tomcat8 (ALAS-2016-736)\");\n script_summary(english:\"Checks rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Amazon Linux AMI host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"A denial of service vulnerability was identified in Commons FileUpload\nthat occurred when the length of the multipart boundary was just below\nthe size of the buffer (4096 bytes) used to read the uploaded file if\nthe boundary was the typical tens of bytes long.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://alas.aws.amazon.com/ALAS-2016-736.html\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Run 'yum update tomcat7' to update your system.\n\nRun 'yum update tomcat8' to update your system.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-admin-webapps\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-docs-webapp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-el-2.2-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-jsp-2.2-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-log4j\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-servlet-3.0-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat7-webapps\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-admin-webapps\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-docs-webapp\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-el-3.0-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-javadoc\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-jsp-2.3-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-lib\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-log4j\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-servlet-3.1-api\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:amazon:linux:tomcat8-webapps\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:amazon:linux\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/08/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/08/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2018 Tenable Network Security, Inc.\");\n script_family(english:\"Amazon Linux Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/AmazonLinux/release\", \"Host/AmazonLinux/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\n\nrelease = get_kb_item(\"Host/AmazonLinux/release\");\nif (isnull(release) || !strlen(release)) audit(AUDIT_OS_NOT, \"Amazon Linux\");\nos_ver = pregmatch(pattern: \"^AL(A|\\d)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Amazon Linux\");\nos_ver = os_ver[1];\nif (os_ver != \"A\")\n{\n if (os_ver == 'A') os_ver = 'AMI';\n audit(AUDIT_OS_NOT, \"Amazon Linux AMI\", \"Amazon Linux \" + os_ver);\n}\n\nif (!get_kb_item(\"Host/AmazonLinux/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-admin-webapps-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-docs-webapp-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-el-2.2-api-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-javadoc-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-jsp-2.2-api-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-lib-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-log4j-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-servlet-3.0-api-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat7-webapps-7.0.70-1.18.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-admin-webapps-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-docs-webapp-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-el-3.0-api-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-javadoc-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-jsp-2.3-api-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-lib-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-log4j-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-servlet-3.1-api-8.0.36-1.62.amzn1\")) flag++;\nif (rpm_check(release:\"ALA\", reference:\"tomcat8-webapps-8.0.36-1.62.amzn1\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:rpm_report_get());\n else security_hole(0);\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"tomcat7 / tomcat7-admin-webapps / tomcat7-docs-webapp / etc\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-06T10:52:38", "description": "Jochen Wiedmann reports :\n\nA malicious client can send file upload requests that cause the HTTP\nserver using the Apache Commons Fileupload library to become\nunresponsive, preventing the server from servicing other requests.", "edition": 25, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-07-18T00:00:00", "title": "FreeBSD : Apache Commons FileUpload -- denial of service (61b8c359-4aab-11e6-a7bd-14dae9d210b8)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2016-07-18T00:00:00", "cpe": ["cpe:/o:freebsd:freebsd", "p-cpe:/a:freebsd:freebsd:tomcat", "p-cpe:/a:freebsd:freebsd:tomcat8", "p-cpe:/a:freebsd:freebsd:tomcat7", "p-cpe:/a:freebsd:freebsd:apache-struts"], "id": "FREEBSD_PKG_61B8C3594AAB11E6A7BD14DAE9D210B8.NASL", "href": "https://www.tenable.com/plugins/nessus/92342", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from the FreeBSD VuXML database :\n#\n# Copyright 2003-2017 Jacques Vidrine and contributors\n#\n# Redistribution and use in source (VuXML) and 'compiled' forms (SGML,\n# HTML, PDF, PostScript, RTF and so forth) with or without modification,\n# are permitted provided that the following conditions are met:\n# 1. Redistributions of source code (VuXML) must retain the above\n# copyright notice, this list of conditions and the following\n# disclaimer as the first lines of this file unmodified.\n# 2. Redistributions in compiled form (transformed to other DTDs,\n# published online in any format, converted to PDF, PostScript,\n# RTF and other formats) must reproduce the above copyright\n# notice, this list of conditions and the following disclaimer\n# in the documentation and/or other materials provided with the\n# distribution.\n# \n# THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS \"AS IS\"\n# AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,\n# THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR\n# PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS\n# BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,\n# OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT\n# OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR\n# BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,\n# WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE\n# OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,\n# EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(92342);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/04\");\n\n script_cve_id(\"CVE-2016-3092\");\n\n script_name(english:\"FreeBSD : Apache Commons FileUpload -- denial of service (61b8c359-4aab-11e6-a7bd-14dae9d210b8)\");\n script_summary(english:\"Checks for updated packages in pkg_info output\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\n\"The remote FreeBSD host is missing one or more security-related\nupdates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"Jochen Wiedmann reports :\n\nA malicious client can send file upload requests that cause the HTTP\nserver using the Apache Commons Fileupload library to become\nunresponsive, preventing the server from servicing other requests.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://jvn.jp/en/jp/JVN89379547/index.html\"\n );\n # http://mail-archives.apache.org/mod_mbox/commons-dev/201606.mbox/%3CCAF8HOZ%2BPq2QH8RnxBuJyoK1dOz6jrTiQypAC%2BH8g6oZkBg%2BCxg%40mail.gmail.com%3E\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?9211a610\"\n );\n # http://www.freebsd.org/ports/portaudit/61b8c359-4aab-11e6-a7bd-14dae9d210b8.html\n script_set_attribute(\n attribute:\"see_also\",\n value:\"http://www.nessus.org/u?f12ae962\"\n );\n script_set_attribute(attribute:\"solution\", value:\"Update the affected packages.\");\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:apache-struts\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:tomcat\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:tomcat7\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:freebsd:freebsd:tomcat8\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:freebsd:freebsd\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/06/21\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/15\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/18\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 Tenable Network Security, Inc.\");\n script_family(english:\"FreeBSD Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/FreeBSD/release\", \"Host/FreeBSD/pkg_info\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"freebsd_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/FreeBSD/release\")) audit(AUDIT_OS_NOT, \"FreeBSD\");\nif (!get_kb_item(\"Host/FreeBSD/pkg_info\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\n\nif (pkg_test(save_report:TRUE, pkg:\"tomcat>=0\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"tomcat7<7.0.70\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"tomcat8<8.0.36\")) flag++;\nif (pkg_test(save_report:TRUE, pkg:\"apache-struts<=2.5.2\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-01T05:06:43", "description": "An update for jboss-ec2-eap is now available for Red Hat JBoss\nEnterprise Application Platform 6.4 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nRed Hat JBoss Enterprise Application Platform 6 is a platform for Java\nEE applications. It is based on JBoss Application Server 7 and\nincorporates multiple open-source projects to provide a complete Java\nEE platform solution.\n\nSecurity Fix(es) :\n\n* A denial of service vulnerability was identified in Commons\nFileUpload that occurred when the length of the multipart boundary was\njust below the size of the buffer (4096 bytes) used to read the\nuploaded file if the boundary was the typical tens of bytes long.\n(CVE-2016-3092)\n\nEnhancement(s) :\n\n* The jboss-ec2-eap packages provide scripts for Red Hat JBoss\nEnterprise Application Platform running on the Amazon Web Services\n(AWS) Elastic Compute Cloud (EC2). With this update, the packages have\nbeen updated to ensure compatibility with Red Hat JBoss Enterprise\nApplication Platform 6.4.11.\n\nUsers of EAP 6.4.10 jboss-ec2-eap are advised to upgrade to these\nupdated packages, which add this enhancement.", "edition": 27, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-10-18T00:00:00", "title": "RHEL 6 : jboss-ec2-eap (RHSA-2016:2072)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2021-01-02T00:00:00", "cpe": ["p-cpe:/a:redhat:enterprise_linux:jboss-ec2-eap-samples", "p-cpe:/a:redhat:enterprise_linux:jboss-ec2-eap", "cpe:/o:redhat:enterprise_linux:6"], "id": "REDHAT-RHSA-2016-2072.NASL", "href": "https://www.tenable.com/plugins/nessus/94104", "sourceData": "#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Red Hat Security Advisory RHSA-2016:2072. The text \n# itself is copyright (C) Red Hat, Inc.\n#\n\ninclude(\"compat.inc\");\n\nif (description)\n{\n script_id(94104);\n script_version(\"2.9\");\n script_cvs_date(\"Date: 2019/10/24 15:35:42\");\n\n script_cve_id(\"CVE-2016-3092\");\n script_xref(name:\"RHSA\", value:\"2016:2072\");\n\n script_name(english:\"RHEL 6 : jboss-ec2-eap (RHSA-2016:2072)\");\n script_summary(english:\"Checks the rpm output for the updated packages\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Red Hat host is missing one or more security updates.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"An update for jboss-ec2-eap is now available for Red Hat JBoss\nEnterprise Application Platform 6.4 for Red Hat Enterprise Linux 6.\n\nRed Hat Product Security has rated this update as having a security\nimpact of Moderate. A Common Vulnerability Scoring System (CVSS) base\nscore, which gives a detailed severity rating, is available for each\nvulnerability from the CVE link(s) in the References section.\n\nRed Hat JBoss Enterprise Application Platform 6 is a platform for Java\nEE applications. It is based on JBoss Application Server 7 and\nincorporates multiple open-source projects to provide a complete Java\nEE platform solution.\n\nSecurity Fix(es) :\n\n* A denial of service vulnerability was identified in Commons\nFileUpload that occurred when the length of the multipart boundary was\njust below the size of the buffer (4096 bytes) used to read the\nuploaded file if the boundary was the typical tens of bytes long.\n(CVE-2016-3092)\n\nEnhancement(s) :\n\n* The jboss-ec2-eap packages provide scripts for Red Hat JBoss\nEnterprise Application Platform running on the Amazon Web Services\n(AWS) Elastic Compute Cloud (EC2). With this update, the packages have\nbeen updated to ensure compatibility with Red Hat JBoss Enterprise\nApplication Platform 6.4.11.\n\nUsers of EAP 6.4.10 jboss-ec2-eap are advised to upgrade to these\nupdated packages, which add this enhancement.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/errata/RHSA-2016:2072\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://access.redhat.com/security/cve/cve-2016-3092\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Update the affected jboss-ec2-eap and / or jboss-ec2-eap-samples\npackages.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:jboss-ec2-eap\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:redhat:enterprise_linux:jboss-ec2-eap-samples\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:redhat:enterprise_linux:6\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/07/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/10/17\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/10/18\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2019 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Red Hat Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\", \"Host/cpu\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"misc_func.inc\");\ninclude(\"rpm.inc\");\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Red Hat\" >!< release) audit(AUDIT_OS_NOT, \"Red Hat\");\nos_ver = pregmatch(pattern: \"Red Hat Enterprise Linux.*release ([0-9]+(\\.[0-9]+)?)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Red Hat\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^6([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Red Hat 6.x\", \"Red Hat \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\" && \"s390\" >!< cpu) audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Red Hat\", cpu);\n\nyum_updateinfo = get_kb_item(\"Host/RedHat/yum-updateinfo\");\nif (!empty_or_null(yum_updateinfo)) \n{\n rhsa = \"RHSA-2016:2072\";\n yum_report = redhat_generate_yum_updateinfo_report(rhsa:rhsa);\n if (!empty_or_null(yum_report))\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : yum_report \n );\n exit(0);\n }\n else\n {\n audit_message = \"affected by Red Hat security advisory \" + rhsa;\n audit(AUDIT_OS_NOT, audit_message);\n }\n}\nelse\n{\n flag = 0;\n if (rpm_check(release:\"RHEL6\", reference:\"jboss-ec2-eap-7.5.11-1.Final_redhat_1.ep6.el6\")) flag++;\n if (rpm_check(release:\"RHEL6\", reference:\"jboss-ec2-eap-samples-7.5.11-1.Final_redhat_1.ep6.el6\")) flag++;\n\n if (flag)\n {\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get() + redhat_report_package_caveat()\n );\n exit(0);\n }\n else\n {\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"jboss-ec2-eap / jboss-ec2-eap-samples\");\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T10:14:04", "description": "This updates includes a rebase from tomcat 8.0.32 up to 8.0.36 to\nresolve :\n\n - rhbz#1349469 CVE-2016-3092 tomcat: Usage of vulnerable\n FileUpload package can result in denial of service\n\nand also includes the following bug fixes :\n\n - rhbz#1341850 tomcat-jsvc.service has TOMCAT_USER value\n hard-coded\n\n - rhbz#1341853 rpm -V tomcat fails on\n /var/log/tomcat/catalina.out\n\n - rhbz#1347835 The security manager doesn't work correctly\n (JSPs cannot be compiled)\n\n - rhbz#1347864 The systemd service unit does not allow\n tomcat to shut down gracefully\n\n - rhbz#1357428 Tomcat 8.0.32 breaks deploy for candlepin.\n\n - rhbz#1359737 Missing maven depmap for the following\n artifacts: org.apache.tomcat:tomcat-websocket,\n org.apache.tomcat:tomcat-websocket-api\n\n - rhbz#1363884 The tomcat-tool-wrapper script is broken\n\n - rhbz#1364056 The command tomcat-digest doesn't work\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 19, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-09-02T00:00:00", "title": "Fedora 24 : 1:tomcat (2016-2b0c16fd82)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2016-09-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:1:tomcat", "cpe:/o:fedoraproject:fedora:24"], "id": "FEDORA_2016-2B0C16FD82.NASL", "href": "https://www.tenable.com/plugins/nessus/93260", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-2b0c16fd82.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93260);\n script_version(\"2.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-3092\");\n script_xref(name:\"FEDORA\", value:\"2016-2b0c16fd82\");\n\n script_name(english:\"Fedora 24 : 1:tomcat (2016-2b0c16fd82)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This updates includes a rebase from tomcat 8.0.32 up to 8.0.36 to\nresolve :\n\n - rhbz#1349469 CVE-2016-3092 tomcat: Usage of vulnerable\n FileUpload package can result in denial of service\n\nand also includes the following bug fixes :\n\n - rhbz#1341850 tomcat-jsvc.service has TOMCAT_USER value\n hard-coded\n\n - rhbz#1341853 rpm -V tomcat fails on\n /var/log/tomcat/catalina.out\n\n - rhbz#1347835 The security manager doesn't work correctly\n (JSPs cannot be compiled)\n\n - rhbz#1347864 The systemd service unit does not allow\n tomcat to shut down gracefully\n\n - rhbz#1357428 Tomcat 8.0.32 breaks deploy for candlepin.\n\n - rhbz#1359737 Missing maven depmap for the following\n artifacts: org.apache.tomcat:tomcat-websocket,\n org.apache.tomcat:tomcat-websocket-api\n\n - rhbz#1363884 The tomcat-tool-wrapper script is broken\n\n - rhbz#1364056 The command tomcat-digest doesn't work\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-2b0c16fd82\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 1:tomcat package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:1:tomcat\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:24\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/07/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/09/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^24([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 24\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC24\", reference:\"tomcat-8.0.36-2.fc24\", epoch:\"1\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"1:tomcat\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T10:13:58", "description": "This updates includes a rebase from tomcat 8.0.32 up to 8.0.36 to\nresolve :\n\n - rhbz#1349469 CVE-2016-3092 tomcat: Usage of vulnerable\n FileUpload package can result in denial of service\n\nand also includes the following bug fixes :\n\n - rhbz#1341850 tomcat-jsvc.service has TOMCAT_USER value\n hard-coded\n\n - rhbz#1341853 rpm -V tomcat fails on\n /var/log/tomcat/catalina.out\n\n - rhbz#1347835 The security manager doesn't work correctly\n (JSPs cannot be compiled)\n\n - rhbz#1347864 The systemd service unit does not allow\n tomcat to shut down gracefully\n\n - rhbz#1357428 Tomcat 8.0.32 breaks deploy for candlepin.\n\n - rhbz#1359737 Missing maven depmap for the following\n artifacts: org.apache.tomcat:tomcat-websocket,\n org.apache.tomcat:tomcat-websocket-api\n\n - rhbz#1363884 The tomcat-tool-wrapper script is broken\n\n - rhbz#1364056 The command tomcat-digest doesn't work\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 19, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-09-02T00:00:00", "title": "Fedora 23 : 1:tomcat (2016-0a4dccdd23)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2016-09-02T00:00:00", "cpe": ["p-cpe:/a:fedoraproject:fedora:1:tomcat", "cpe:/o:fedoraproject:fedora:23"], "id": "FEDORA_2016-0A4DCCDD23.NASL", "href": "https://www.tenable.com/plugins/nessus/93259", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-0a4dccdd23.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(93259);\n script_version(\"2.5\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-3092\");\n script_xref(name:\"FEDORA\", value:\"2016-0a4dccdd23\");\n\n script_name(english:\"Fedora 23 : 1:tomcat (2016-0a4dccdd23)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This updates includes a rebase from tomcat 8.0.32 up to 8.0.36 to\nresolve :\n\n - rhbz#1349469 CVE-2016-3092 tomcat: Usage of vulnerable\n FileUpload package can result in denial of service\n\nand also includes the following bug fixes :\n\n - rhbz#1341850 tomcat-jsvc.service has TOMCAT_USER value\n hard-coded\n\n - rhbz#1341853 rpm -V tomcat fails on\n /var/log/tomcat/catalina.out\n\n - rhbz#1347835 The security manager doesn't work correctly\n (JSPs cannot be compiled)\n\n - rhbz#1347864 The systemd service unit does not allow\n tomcat to shut down gracefully\n\n - rhbz#1357428 Tomcat 8.0.32 breaks deploy for candlepin.\n\n - rhbz#1359737 Missing maven depmap for the following\n artifacts: org.apache.tomcat:tomcat-websocket,\n org.apache.tomcat:tomcat-websocket-api\n\n - rhbz#1363884 The tomcat-tool-wrapper script is broken\n\n - rhbz#1364056 The command tomcat-digest doesn't work\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-0a4dccdd23\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 1:tomcat package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:1:tomcat\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:23\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/07/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/09/02\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^23([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 23\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC23\", reference:\"tomcat-8.0.36-2.fc23\", epoch:\"1\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"1:tomcat\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T09:49:41", "description": "The TERASOLUNA Framework Development Team discovered a denial of\nservice vulnerability in Apache Commons FileUpload, a package to make\nit easy to add robust, high-performance, file upload capability to\nservlets and web applications. A remote attacker can take advantage of\nthis flaw by sending file upload requests that cause the HTTP server\nusing the Apache Commons Fileupload library to become unresponsive,\npreventing the server from servicing other requests.\n\nApache Tomcat uses a package renamed copy of Apache Commons FileUpload\nto implement the file upload requirements of the Servlet specification\nand is therefore also vulnerable to the denial of service\nvulnerability.", "edition": 24, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-07-05T00:00:00", "title": "Debian DSA-3614-1 : tomcat7 - security update", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2016-07-05T00:00:00", "cpe": ["cpe:/o:debian:debian_linux:8.0", "p-cpe:/a:debian:debian_linux:tomcat7"], "id": "DEBIAN_DSA-3614.NASL", "href": "https://www.tenable.com/plugins/nessus/91925", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Debian Security Advisory DSA-3614. The text \n# itself is copyright (C) Software in the Public Interest, Inc.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(91925);\n script_version(\"2.8\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-3092\");\n script_xref(name:\"DSA\", value:\"3614\");\n\n script_name(english:\"Debian DSA-3614-1 : tomcat7 - security update\");\n script_summary(english:\"Checks dpkg output for the updated package\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Debian host is missing a security-related update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"The TERASOLUNA Framework Development Team discovered a denial of\nservice vulnerability in Apache Commons FileUpload, a package to make\nit easy to add robust, high-performance, file upload capability to\nservlets and web applications. A remote attacker can take advantage of\nthis flaw by sending file upload requests that cause the HTTP server\nusing the Apache Commons Fileupload library to become unresponsive,\npreventing the server from servicing other requests.\n\nApache Tomcat uses a package renamed copy of Apache Commons FileUpload\nto implement the file upload requirements of the Servlet specification\nand is therefore also vulnerable to the denial of service\nvulnerability.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://packages.debian.org/source/jessie/tomcat7\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://www.debian.org/security/2016/dsa-3614\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\n\"Upgrade the tomcat7 packages.\n\nFor the stable distribution (jessie), this problem has been fixed in\nversion 7.0.56-3+deb8u3.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss_temporal_vector(\"CVSS2#E:U/RL:OF/RC:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n script_set_cvss3_temporal_vector(\"CVSS:3.0/E:U/RL:O/RC:C\");\n script_set_attribute(attribute:\"exploitability_ease\", value:\"No known exploits are available\");\n script_set_attribute(attribute:\"exploit_available\", value:\"false\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:debian:debian_linux:tomcat7\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:debian:debian_linux:8.0\");\n\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/07/02\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/07/05\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Debian Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/Debian/release\", \"Host/Debian/dpkg-l\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"debian_package.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nif (!get_kb_item(\"Host/Debian/release\")) audit(AUDIT_OS_NOT, \"Debian\");\nif (!get_kb_item(\"Host/Debian/dpkg-l\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\nflag = 0;\nif (deb_check(release:\"8.0\", prefix:\"libservlet3.0-java\", reference:\"7.0.56-3+deb8u3\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libservlet3.0-java-doc\", reference:\"7.0.56-3+deb8u3\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"libtomcat7-java\", reference:\"7.0.56-3+deb8u3\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tomcat7\", reference:\"7.0.56-3+deb8u3\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tomcat7-admin\", reference:\"7.0.56-3+deb8u3\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tomcat7-common\", reference:\"7.0.56-3+deb8u3\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tomcat7-docs\", reference:\"7.0.56-3+deb8u3\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tomcat7-examples\", reference:\"7.0.56-3+deb8u3\")) flag++;\nif (deb_check(release:\"8.0\", prefix:\"tomcat7-user\", reference:\"7.0.56-3+deb8u3\")) flag++;\n\nif (flag)\n{\n if (report_verbosity > 0) security_hole(port:0, extra:deb_report_get());\n else security_hole(0);\n exit(0);\n}\nelse audit(AUDIT_HOST_NOT, \"affected\");\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2021-01-12T10:15:03", "description": "This updates includes a rebase from tomcat 8.0.32 up to 8.0.36 to\nresolve :\n\n - rhbz#1349469 CVE-2016-3092 tomcat: Usage of vulnerable\n FileUpload package can result in denial of service\n\nand also includes the following bug fixes :\n\n - rhbz#1341850 tomcat-jsvc.service has TOMCAT_USER value\n hard-coded\n\n - rhbz#1341853 rpm -V tomcat fails on\n /var/log/tomcat/catalina.out\n\n - rhbz#1347835 The security manager doesn't work correctly\n (JSPs cannot be compiled)\n\n - rhbz#1347864 The systemd service unit does not allow\n tomcat to shut down gracefully\n\n - rhbz#1357428 Tomcat 8.0.32 breaks deploy for candlepin.\n\n - rhbz#1359737 Missing maven depmap for the following\n artifacts: org.apache.tomcat:tomcat-websocket,\n org.apache.tomcat:tomcat-websocket-api\n\n - rhbz#1363884 The tomcat-tool-wrapper script is broken\n\n - rhbz#1364056 The command tomcat-digest doesn't work\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.", "edition": 18, "cvss3": {"score": 7.5, "vector": "AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H"}, "published": "2016-11-15T00:00:00", "title": "Fedora 25 : 1:tomcat (2016-f4a443888b)", "type": "nessus", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "modified": "2016-11-15T00:00:00", "cpe": ["cpe:/o:fedoraproject:fedora:25", "p-cpe:/a:fedoraproject:fedora:1:tomcat"], "id": "FEDORA_2016-F4A443888B.NASL", "href": "https://www.tenable.com/plugins/nessus/94880", "sourceData": "#%NASL_MIN_LEVEL 70300\n#\n# (C) Tenable Network Security, Inc.\n#\n# The descriptive text and package checks in this plugin were \n# extracted from Fedora Security Advisory FEDORA-2016-f4a443888b.\n#\n\ninclude('deprecated_nasl_level.inc');\ninclude('compat.inc');\n\nif (description)\n{\n script_id(94880);\n script_version(\"2.4\");\n script_set_attribute(attribute:\"plugin_modification_date\", value:\"2021/01/11\");\n\n script_cve_id(\"CVE-2016-3092\");\n script_xref(name:\"FEDORA\", value:\"2016-f4a443888b\");\n\n script_name(english:\"Fedora 25 : 1:tomcat (2016-f4a443888b)\");\n script_summary(english:\"Checks rpm output for the updated package.\");\n\n script_set_attribute(\n attribute:\"synopsis\", \n value:\"The remote Fedora host is missing a security update.\"\n );\n script_set_attribute(\n attribute:\"description\", \n value:\n\"This updates includes a rebase from tomcat 8.0.32 up to 8.0.36 to\nresolve :\n\n - rhbz#1349469 CVE-2016-3092 tomcat: Usage of vulnerable\n FileUpload package can result in denial of service\n\nand also includes the following bug fixes :\n\n - rhbz#1341850 tomcat-jsvc.service has TOMCAT_USER value\n hard-coded\n\n - rhbz#1341853 rpm -V tomcat fails on\n /var/log/tomcat/catalina.out\n\n - rhbz#1347835 The security manager doesn't work correctly\n (JSPs cannot be compiled)\n\n - rhbz#1347864 The systemd service unit does not allow\n tomcat to shut down gracefully\n\n - rhbz#1357428 Tomcat 8.0.32 breaks deploy for candlepin.\n\n - rhbz#1359737 Missing maven depmap for the following\n artifacts: org.apache.tomcat:tomcat-websocket,\n org.apache.tomcat:tomcat-websocket-api\n\n - rhbz#1363884 The tomcat-tool-wrapper script is broken\n\n - rhbz#1364056 The command tomcat-digest doesn't work\n\nNote that Tenable Network Security has extracted the preceding\ndescription block directly from the Fedora update system website.\nTenable has attempted to automatically clean and format it as much as\npossible without introducing additional issues.\"\n );\n script_set_attribute(\n attribute:\"see_also\",\n value:\"https://bodhi.fedoraproject.org/updates/FEDORA-2016-f4a443888b\"\n );\n script_set_attribute(\n attribute:\"solution\", \n value:\"Update the affected 1:tomcat package.\"\n );\n script_set_cvss_base_vector(\"CVSS2#AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_set_cvss3_base_vector(\"CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:N/A:H\");\n\n script_set_attribute(attribute:\"plugin_type\", value:\"local\");\n script_set_attribute(attribute:\"cpe\", value:\"p-cpe:/a:fedoraproject:fedora:1:tomcat\");\n script_set_attribute(attribute:\"cpe\", value:\"cpe:/o:fedoraproject:fedora:25\");\n\n script_set_attribute(attribute:\"vuln_publication_date\", value:\"2016/07/04\");\n script_set_attribute(attribute:\"patch_publication_date\", value:\"2016/09/01\");\n script_set_attribute(attribute:\"plugin_publication_date\", value:\"2016/11/15\");\n script_set_attribute(attribute:\"generated_plugin\", value:\"current\");\n script_end_attributes();\n\n script_category(ACT_GATHER_INFO);\n script_copyright(english:\"This script is Copyright (C) 2016-2021 and is owned by Tenable, Inc. or an Affiliate thereof.\");\n script_family(english:\"Fedora Local Security Checks\");\n\n script_dependencies(\"ssh_get_info.nasl\");\n script_require_keys(\"Host/local_checks_enabled\", \"Host/RedHat/release\", \"Host/RedHat/rpm-list\");\n\n exit(0);\n}\n\n\ninclude(\"audit.inc\");\ninclude(\"global_settings.inc\");\ninclude(\"rpm.inc\");\n\n\nif (!get_kb_item(\"Host/local_checks_enabled\")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);\nrelease = get_kb_item(\"Host/RedHat/release\");\nif (isnull(release) || \"Fedora\" >!< release) audit(AUDIT_OS_NOT, \"Fedora\");\nos_ver = pregmatch(pattern: \"Fedora.*release ([0-9]+)\", string:release);\nif (isnull(os_ver)) audit(AUDIT_UNKNOWN_APP_VER, \"Fedora\");\nos_ver = os_ver[1];\nif (! preg(pattern:\"^25([^0-9]|$)\", string:os_ver)) audit(AUDIT_OS_NOT, \"Fedora 25\", \"Fedora \" + os_ver);\n\nif (!get_kb_item(\"Host/RedHat/rpm-list\")) audit(AUDIT_PACKAGE_LIST_MISSING);\n\n\ncpu = get_kb_item(\"Host/cpu\");\nif (isnull(cpu)) audit(AUDIT_UNKNOWN_ARCH);\nif (\"x86_64\" >!< cpu && cpu !~ \"^i[3-6]86$\") audit(AUDIT_LOCAL_CHECKS_NOT_IMPLEMENTED, \"Fedora\", cpu);\n\n\nflag = 0;\nif (rpm_check(release:\"FC25\", reference:\"tomcat-8.0.36-2.fc25\", epoch:\"1\")) flag++;\n\n\nif (flag)\n{\n security_report_v4(\n port : 0,\n severity : SECURITY_HOLE,\n extra : rpm_report_get()\n );\n exit(0);\n}\nelse\n{\n tested = pkg_tests_get();\n if (tested) audit(AUDIT_PACKAGE_NOT_AFFECTED, tested);\n else audit(AUDIT_PACKAGE_NOT_INSTALLED, \"1:tomcat\");\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "openvas": [{"lastseen": "2019-05-29T18:35:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-0282"], "description": "This host is installed with IBM Domino and\n is prone to cross-site scripting vulnerability", "modified": "2018-10-17T00:00:00", "published": "2016-11-25T00:00:00", "id": "OPENVAS:1361412562310809820", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310809820", "type": "openvas", "title": "IBM INotes and Domino Cross-site Scripting Vulnerability - Nov16", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_ibm_inotes_domino_xss_vuln_nov16.nasl 11938 2018-10-17 10:08:39Z asteins $\n#\n# IBM INotes and Domino Cross-site Scripting Vulnerability - Nov16\n#\n# Authors:\n# Kashinath T <tkashinath@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:ibm:lotus_domino\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.809820\");\n script_version(\"$Revision: 11938 $\");\n script_cve_id(\"CVE-2016-0282\");\n script_tag(name:\"cvss_base\", value:\"3.5\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:M/Au:S/C:N/I:P/A:N\");\n script_tag(name:\"last_modification\", value:\"$Date: 2018-10-17 12:08:39 +0200 (Wed, 17 Oct 2018) $\");\n script_tag(name:\"creation_date\", value:\"2016-11-25 17:07:04 +0530 (Fri, 25 Nov 2016)\");\n script_name(\"IBM INotes and Domino Cross-site Scripting Vulnerability - Nov16\");\n\n script_tag(name:\"summary\", value:\"This host is installed with IBM Domino and\n is prone to cross-site scripting vulnerability\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to an improper validation of\n user-supplied input.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow attacker\n to execute script in a victim's Web browser within the security context of the\n hosting Web site, once the URL is clicked.\");\n\n script_tag(name:\"affected\", value:\"IBM iNotes and Domino 8.5.x before 8.5.3 FP6\n IF2.\");\n\n script_tag(name:\"solution\", value:\"Upgrade to IBM Domino 8.5.3 FP6 IF2.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_tag(name:\"qod_type\", value:\"remote_banner_unreliable\");\n\n script_xref(name:\"URL\", value:\"http://www-01.ibm.com/support/docview.wss?uid=swg21991722\");\n\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_category(ACT_GATHER_INFO);\n script_family(\"Web application abuses\");\n script_dependencies(\"gb_lotus_domino_detect.nasl\");\n script_mandatory_keys(\"Domino/Version\");\n exit(0);\n}\n\ninclude(\"version_func.inc\");\ninclude(\"revisions-lib.inc\"); # Used in get_highest_app_version\ninclude(\"host_details.inc\");\n\nif(!domVer = get_highest_app_version(cpe:CPE)){\n exit(0);\n}\n\ndomVer1 = ereg_replace(pattern:\"FP\", string:domVer, replace: \".\");\n\nif(version_in_range(version:domVer1, test_version:\"8.5\", test_version2:\"8.5.3.6\"))\n{\n report = report_fixed_ver(installed_version:domVer, fixed_version:\"8.5.3 FP6 IF2\");\n security_message(data:report, port:0);\n exit(0);\n}\n", "cvss": {"score": 3.5, "vector": "AV:N/AC:M/Au:S/C:N/I:P/A:N"}}, {"lastseen": "2019-05-29T18:34:57", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-09-07T00:00:00", "id": "OPENVAS:1361412562310809211", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310809211", "type": "openvas", "title": "Fedora Update for tomcat FEDORA-2016-2b0c16fd82", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for tomcat FEDORA-2016-2b0c16fd82\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.809211\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-09-07 10:08:49 +0530 (Wed, 07 Sep 2016)\");\n script_cve_id(\"CVE-2016-3092\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for tomcat FEDORA-2016-2b0c16fd82\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'tomcat'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"tomcat on Fedora 24\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-2b0c16fd82\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/CGKTN56RYEOATBJRRTH2QOUFHQNDGEZM\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC24\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC24\")\n{\n\n if ((res = isrpmvuln(pkg:\"tomcat\", rpm:\"tomcat~8.0.36~2.fc24\", rls:\"FC24\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:35:07", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "The TERASOLUNA Framework Development Team\ndiscovered a denial of service vulnerability in Apache Commons FileUpload, a package\nto make it easy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.", "modified": "2019-03-18T00:00:00", "published": "2016-07-07T00:00:00", "id": "OPENVAS:1361412562310703611", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703611", "type": "openvas", "title": "Debian Security Advisory DSA 3611-1 (libcommons-fileupload-java - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3611.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3611-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703611\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2016-3092\");\n script_name(\"Debian Security Advisory DSA 3611-1 (libcommons-fileupload-java - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-07-07 16:52:12 +0530 (Thu, 07 Jul 2016)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3611.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(9|8)\");\n script_tag(name:\"affected\", value:\"libcommons-fileupload-java on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), this\nproblem has been fixed in version 1.3.1-1+deb8u1.\n\nFor the testing distribution (stretch), this problem has been fixed\nin version 1.3.2-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.3.2-1.\n\nWe recommend that you upgrade your libcommons-fileupload-java packages.\");\n script_tag(name:\"summary\", value:\"The TERASOLUNA Framework Development Team\ndiscovered a denial of service vulnerability in Apache Commons FileUpload, a package\nto make it easy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software\nversion using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libcommons-fileupload-java\", ver:\"1.3.2-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcommons-fileupload-java-doc\", ver:\"1.3.2-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcommons-fileupload-java\", ver:\"1.3.1-1+deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libcommons-fileupload-java-doc\", ver:\"1.3.1-1+deb8u1\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:35:26", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-09-07T00:00:00", "id": "OPENVAS:1361412562310809213", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310809213", "type": "openvas", "title": "Fedora Update for tomcat FEDORA-2016-0a4dccdd23", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for tomcat FEDORA-2016-0a4dccdd23\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.809213\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-09-07 10:08:52 +0530 (Wed, 07 Sep 2016)\");\n script_cve_id(\"CVE-2016-3092\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for tomcat FEDORA-2016-0a4dccdd23\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'tomcat'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"tomcat on Fedora 23\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-0a4dccdd23\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XV3BH62NHHAKU4LXNWSBJ5QJTUMF22GP\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC23\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC23\")\n{\n\n if ((res = isrpmvuln(pkg:\"tomcat\", rpm:\"tomcat~8.0.36~2.fc23\", rls:\"FC23\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:35:49", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "The TERASOLUNA Framework Development Team\ndiscovered a denial of service vulnerability in Apache Commons FileUpload, a package\nto make it easy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.\n\nApache Tomcat uses a package renamed copy of Apache Commons FileUpload\nto implement the file upload requirements of the Servlet specification\nand is therefore also vulnerable to the denial of service vulnerability.", "modified": "2019-03-18T00:00:00", "published": "2016-07-02T00:00:00", "id": "OPENVAS:1361412562310703614", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310703614", "type": "openvas", "title": "Debian Security Advisory DSA 3614-1 (tomcat7 - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3614.nasl 14279 2019-03-18 14:48:34Z cfischer $\n# Auto-generated from advisory DSA 3614-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.703614\");\n script_version(\"$Revision: 14279 $\");\n script_cve_id(\"CVE-2016-3092\");\n script_name(\"Debian Security Advisory DSA 3614-1 (tomcat7 - security update)\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-18 15:48:34 +0100 (Mon, 18 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-07-02 00:00:00 +0200 (Sat, 02 Jul 2016)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_tag(name:\"qod_type\", value:\"package\");\n\n script_xref(name:\"URL\", value:\"http://www.debian.org/security/2016/dsa-3614.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\", re:\"ssh/login/release=DEB(8|9)\");\n script_tag(name:\"affected\", value:\"tomcat7 on Debian Linux\");\n script_tag(name:\"solution\", value:\"For the stable distribution (jessie), this\nproblem has been fixed in version 7.0.56-3+deb8u3.\n\nFor the testing distribution (stretch), this problem has been fixed\nin version 7.0.70-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 7.0.70-1.\n\nWe recommend that you upgrade your tomcat7 packages.\");\n script_tag(name:\"summary\", value:\"The TERASOLUNA Framework Development Team\ndiscovered a denial of service vulnerability in Apache Commons FileUpload, a package\nto make it easy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.\n\nApache Tomcat uses a package renamed copy of Apache Commons FileUpload\nto implement the file upload requirements of the Servlet specification\nand is therefore also vulnerable to the denial of service vulnerability.\");\n script_tag(name:\"vuldetect\", value:\"This check tests the installed software\nversion using the apt package manager.\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif((res = isdpkgvuln(pkg:\"libservlet3.0-java\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libservlet3.0-java-doc\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libtomcat7-java\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-admin\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-common\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-docs\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-examples\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-user\", ver:\"7.0.56-3+deb8u3\", rls:\"DEB8\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libservlet3.0-java\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libservlet3.0-java-doc\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"libtomcat7-java\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-admin\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-common\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-docs\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-examples\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\nif((res = isdpkgvuln(pkg:\"tomcat7-user\", ver:\"7.0.70-1\", rls:\"DEB9\")) != NULL) {\n report += res;\n}\n\nif(report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-07-24T12:55:12", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "The TERASOLUNA Framework Development Team\ndiscovered a denial of service vulnerability in Apache Commons FileUpload, a package\nto make it easy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.\n\nApache Tomcat uses a package renamed copy of Apache Commons FileUpload\nto implement the file upload requirements of the Servlet specification\nand is therefore also vulnerable to the denial of service vulnerability.", "modified": "2017-07-07T00:00:00", "published": "2016-07-02T00:00:00", "id": "OPENVAS:703614", "href": "http://plugins.openvas.org/nasl.php?oid=703614", "type": "openvas", "title": "Debian Security Advisory DSA 3614-1 (tomcat7 - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3614.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3614-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703614);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-3092\");\n script_name(\"Debian Security Advisory DSA 3614-1 (tomcat7 - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-07-02 00:00:00 +0200 (Sat, 02 Jul 2016)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3614.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"tomcat7 on Debian Linux\");\n script_tag(name: \"insight\", value: \"Apache Tomcat implements the Java Servlet\nand the JavaServer Pages (JSP) specifications from Sun Microsystems, and provides a\n'pure Java' HTTP web server environment for Java code to run.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), this\nproblem has been fixed in version 7.0.56-3+deb8u3.\n\nFor the testing distribution (stretch), this problem has been fixed\nin version 7.0.70-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 7.0.70-1.\n\nWe recommend that you upgrade your tomcat7 packages.\");\n script_tag(name: \"summary\", value: \"The TERASOLUNA Framework Development Team\ndiscovered a denial of service vulnerability in Apache Commons FileUpload, a package\nto make it easy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.\n\nApache Tomcat uses a package renamed copy of Apache Commons FileUpload\nto implement the file upload requirements of the Servlet specification\nand is therefore also vulnerable to the denial of service vulnerability.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libservlet3.0-java\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libservlet3.0-java-doc\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libtomcat7-java\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-admin\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-common\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-docs\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-examples\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-user\", ver:\"7.0.56-3+deb8u3\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libservlet3.0-java\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libservlet3.0-java-doc\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libtomcat7-java\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-admin\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-common\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-docs\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-examples\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"tomcat7-user\", ver:\"7.0.70-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2017-07-24T12:54:27", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "The TERASOLUNA Framework Development Team\ndiscovered a denial of service vulnerability in Apache Commons FileUpload, a package\nto make it easy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.", "modified": "2017-07-07T00:00:00", "published": "2016-07-07T00:00:00", "id": "OPENVAS:703611", "href": "http://plugins.openvas.org/nasl.php?oid=703611", "type": "openvas", "title": "Debian Security Advisory DSA 3611-1 (libcommons-fileupload-java - security update)", "sourceData": "# OpenVAS Vulnerability Test\n# $Id: deb_3611.nasl 6608 2017-07-07 12:05:05Z cfischer $\n# Auto-generated from advisory DSA 3611-1 using nvtgen 1.0\n# Script version: 1.0\n#\n# Author:\n# Greenbone Networks\n#\n# Copyright:\n# Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (c) the respective author(s)\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n#\n\n\nif(description)\n{\n script_id(703611);\n script_version(\"$Revision: 6608 $\");\n script_cve_id(\"CVE-2016-3092\");\n script_name(\"Debian Security Advisory DSA 3611-1 (libcommons-fileupload-java - security update)\");\n script_tag(name: \"last_modification\", value: \"$Date: 2017-07-07 14:05:05 +0200 (Fri, 07 Jul 2017) $\");\n script_tag(name: \"creation_date\", value: \"2016-07-07 16:52:12 +0530 (Thu, 07 Jul 2016)\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name: \"solution_type\", value: \"VendorFix\");\n script_tag(name: \"qod_type\", value: \"package\");\n\n script_xref(name: \"URL\", value: \"http://www.debian.org/security/2016/dsa-3611.html\");\n\n\n script_category(ACT_GATHER_INFO);\n\n script_copyright(\"Copyright (c) 2016 Greenbone Networks GmbH http://greenbone.net\");\n script_family(\"Debian Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/debian_linux\", \"ssh/login/packages\");\n script_tag(name: \"affected\", value: \"libcommons-fileupload-java on Debian Linux\");\n script_tag(name: \"insight\", value: \"The Commons FileUpload package makes\nit easy to add robust, high-performance, file upload capability to your servlets and\nweb applications.\");\n script_tag(name: \"solution\", value: \"For the stable distribution (jessie), this\nproblem has been fixed in version 1.3.1-1+deb8u1.\n\nFor the testing distribution (stretch), this problem has been fixed\nin version 1.3.2-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.3.2-1.\n\nWe recommend that you upgrade your libcommons-fileupload-java packages.\");\n script_tag(name: \"summary\", value: \"The TERASOLUNA Framework Development Team\ndiscovered a denial of service vulnerability in Apache Commons FileUpload, a package\nto make it easy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.\");\n script_tag(name: \"vuldetect\", value: \"This check tests the installed software\nversion using the apt package manager.\");\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-deb.inc\");\n\nres = \"\";\nreport = \"\";\nif ((res = isdpkgvuln(pkg:\"libcommons-fileupload-java\", ver:\"1.3.2-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libcommons-fileupload-java-doc\", ver:\"1.3.2-1\", rls_regex:\"DEB9.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libcommons-fileupload-java\", ver:\"1.3.1-1+deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\nif ((res = isdpkgvuln(pkg:\"libcommons-fileupload-java-doc\", ver:\"1.3.1-1+deb8u1\", rls_regex:\"DEB8.[0-9]+\")) != NULL) {\n report += res;\n}\n\nif (report != \"\") {\n security_message(data:report);\n} else if (__pkg_match) {\n exit(99); # Not vulnerable.\n}\n", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2020-03-17T22:57:04", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "The remote host is missing an update announced via the referenced Security Advisory.", "modified": "2020-03-13T00:00:00", "published": "2016-10-26T00:00:00", "id": "OPENVAS:1361412562310120725", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310120725", "type": "openvas", "title": "Amazon Linux: Security Advisory (ALAS-2016-736)", "sourceData": "# Copyright (C) 2016 Eero Volotinen\n# Text descriptions are largely excerpted from the referenced\n# advisory, and are Copyright (C) of their respective author(s)\n#\n# SPDX-License-Identifier: GPL-2.0-or-later\n#\n# This program is free software; you can redistribute it and/or\n# modify it under the terms of the GNU General Public License\n# as published by the Free Software Foundation; either version 2\n# of the License, or (at your option) any later version.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.120725\");\n script_version(\"2020-03-13T13:19:50+0000\");\n script_tag(name:\"creation_date\", value:\"2016-10-26 15:38:21 +0300 (Wed, 26 Oct 2016)\");\n script_tag(name:\"last_modification\", value:\"2020-03-13 13:19:50 +0000 (Fri, 13 Mar 2020)\");\n script_name(\"Amazon Linux: Security Advisory (ALAS-2016-736)\");\n script_tag(name:\"insight\", value:\"A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long.\");\n script_tag(name:\"solution\", value:\"Run yum update tomcat7 to update your system.\n\n Run yum update tomcat8 to update your system.\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_xref(name:\"URL\", value:\"https://alas.aws.amazon.com/ALAS-2016-736.html\");\n script_cve_id(\"CVE-2016-3092\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/amazon_linux\", \"ssh/login/release\");\n script_category(ACT_GATHER_INFO);\n script_tag(name:\"summary\", value:\"The remote host is missing an update announced via the referenced Security Advisory.\");\n script_copyright(\"Copyright (C) 2016 Eero Volotinen\");\n script_family(\"Amazon Linux Local Security Checks\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\nreport = \"\";\n\nif(release == \"AMAZON\") {\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-servlet-3.0-api\", rpm:\"tomcat7-servlet-3.0-api~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-docs-webapp\", rpm:\"tomcat7-docs-webapp~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-log4j\", rpm:\"tomcat7-log4j~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-jsp-2.2-api\", rpm:\"tomcat7-jsp-2.2-api~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-javadoc\", rpm:\"tomcat7-javadoc~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-admin-webapps\", rpm:\"tomcat7-admin-webapps~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-el-2.2-api\", rpm:\"tomcat7-el-2.2-api~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-webapps\", rpm:\"tomcat7-webapps~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat7-lib\", rpm:\"tomcat7-lib~7.0.70~1.18.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-lib\", rpm:\"tomcat8-lib~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-el-3.0-api\", rpm:\"tomcat8-el-3.0-api~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-jsp-2.3-api\", rpm:\"tomcat8-jsp-2.3-api~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-webapps\", rpm:\"tomcat8-webapps~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-docs-webapp\", rpm:\"tomcat8-docs-webapp~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-log4j\", rpm:\"tomcat8-log4j~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-javadoc\", rpm:\"tomcat8-javadoc~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-servlet-3.1-api\", rpm:\"tomcat8-servlet-3.1-api~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(!isnull(res = isrpmvuln(pkg:\"tomcat8-admin-webapps\", rpm:\"tomcat8-admin-webapps~8.0.36~1.62.amzn1\", rls:\"AMAZON\"))) {\n report += res;\n }\n\n if(report != \"\") {\n security_message(data:report);\n } else if(__pkg_match) {\n exit(99);\n }\n exit(0);\n}\n\nexit(0);\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-03-05T18:54:34", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "This host is installed with Apache Tomcat\n and is prone denial of service vulnerability.", "modified": "2020-03-04T00:00:00", "published": "2016-07-13T00:00:00", "id": "OPENVAS:1361412562310808197", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310808197", "type": "openvas", "title": "Apache Tomcat 'MultipartStream' Class Denial of Service Vulnerability (Windows)", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n# $Id: gb_tomcat_multipart_stream_class_dos_vuln_win.nasl 60710 2016-07-13 11:25:47 +0530 July$\n#\n# Apache Tomcat 'MultipartStream' Class Denial of Service Vulnerability (Windows)\n#\n# Authors:\n# Kashinath T <tkashinath@secpod.com>\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nCPE = \"cpe:/a:apache:tomcat\";\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.808197\");\n script_version(\"2020-03-04T09:29:37+0000\");\n script_cve_id(\"CVE-2016-3092\");\n script_bugtraq_id(91453);\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"last_modification\", value:\"2020-03-04 09:29:37 +0000 (Wed, 04 Mar 2020)\");\n script_tag(name:\"creation_date\", value:\"2016-07-13 19:19:54 +0530 (Wed, 13 Jul 2016)\");\n script_tag(name:\"qod_type\", value:\"remote_banner\");\n script_name(\"Apache Tomcat 'MultipartStream' Class Denial of Service Vulnerability (Windows)\");\n\n script_tag(name:\"summary\", value:\"This host is installed with Apache Tomcat\n and is prone denial of service vulnerability.\");\n\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n\n script_tag(name:\"insight\", value:\"The flaw is due to an error in the\n 'MultipartStream' class in Apache Commons Fileupload when processing\n multi-part requests.\");\n\n script_tag(name:\"impact\", value:\"Successful exploitation will allow remote\n attackers to cause a denial of service (CPU consumption).\");\n\n script_tag(name:\"affected\", value:\"Apache Tomcat 7.x before 7.0.70, 8.0.0.RC1 before 8.0.36,\n 8.5.x before 8.5.3, and 9.0.0.M1 before 9.0.0.M7 on Windows\");\n\n script_tag(name:\"solution\", value:\"Upgrade to version 7.0.70, or 8.0.36,\n or 8.5.3, or 9.0.0.M7, or later.\");\n\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n\n script_xref(name:\"URL\", value:\"http://tomcat.apache.org/security-7.html\");\n script_xref(name:\"URL\", value:\"http://tomcat.apache.org/security-8.html\");\n script_xref(name:\"URL\", value:\"http://tomcat.apache.org/security-9.html\");\n\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Web Servers\");\n script_dependencies(\"gb_apache_tomcat_consolidation.nasl\", \"os_detection.nasl\");\n script_mandatory_keys(\"apache/tomcat/detected\", \"Host/runs_windows\");\n exit(0);\n}\n\ninclude(\"host_details.inc\");\ninclude(\"version_func.inc\");\n\nif( isnull( appPort = get_app_port( cpe:CPE ) ) )\n exit( 0 );\n\nif( ! infos = get_app_version_and_location( cpe:CPE, port:appPort, exit_no_version:TRUE ) )\n exit( 0 );\n\nappVer = infos[\"version\"];\npath = infos[\"location\"];\n\nif(appVer =~ \"^[7-9]\\.\")\n{\n if(version_in_range(version:appVer, test_version:\"7.0.1\", test_version2:\"7.0.69\"))\n {\n fix = \"7.0.70\";\n VULN = TRUE;\n }\n\n else if(version_in_range(version:appVer, test_version:\"8.5.0\", test_version2:\"8.5.2\"))\n {\n fix = \"8.5.3\";\n VULN = TRUE;\n }\n\n else if(version_in_range(version:appVer, test_version:\"8.0.0.RC1\", test_version2:\"8.0.35\"))\n {\n fix = \"8.0.36\";\n VULN = TRUE;\n }\n\n else if(version_in_range(version:appVer, test_version:\"9.0.0.M1\", test_version2:\"9.0.0.M7\"))\n {\n fix = \"9.0.0.M8\";\n VULN = TRUE;\n }\n\n if(VULN)\n {\n report = report_fixed_ver(installed_version:appVer, fixed_version:fix, install_path:path);\n security_message(data:report, port:appPort);\n exit(0);\n }\n}\n", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T18:35:06", "bulletinFamily": "scanner", "cvelist": ["CVE-2016-3092"], "description": "The remote host is missing an update for the ", "modified": "2019-03-15T00:00:00", "published": "2016-12-07T00:00:00", "id": "OPENVAS:1361412562310871961", "href": "http://plugins.openvas.org/nasl.php?oid=1361412562310871961", "type": "openvas", "title": "Fedora Update for tomcat FEDORA-2016-f4a443888b", "sourceData": "###############################################################################\n# OpenVAS Vulnerability Test\n#\n# Fedora Update for tomcat FEDORA-2016-f4a443888b\n#\n# Authors:\n# System Generated Check\n#\n# Copyright:\n# Copyright (C) 2016 Greenbone Networks GmbH, http://www.greenbone.net\n#\n# This program is free software; you can redistribute it and/or modify\n# it under the terms of the GNU General Public License version 2\n# (or any later version), as published by the Free Software Foundation.\n#\n# This program is distributed in the hope that it will be useful,\n# but WITHOUT ANY WARRANTY; without even the implied warranty of\n# MERCHANTABILITY or FITNESS FOR A PARTICULAR PURPOSE. See the\n# GNU General Public License for more details.\n#\n# You should have received a copy of the GNU General Public License\n# along with this program; if not, write to the Free Software\n# Foundation, Inc., 51 Franklin St, Fifth Floor, Boston, MA 02110-1301 USA.\n###############################################################################\n\nif(description)\n{\n script_oid(\"1.3.6.1.4.1.25623.1.0.871961\");\n script_version(\"$Revision: 14223 $\");\n script_tag(name:\"last_modification\", value:\"$Date: 2019-03-15 14:49:35 +0100 (Fri, 15 Mar 2019) $\");\n script_tag(name:\"creation_date\", value:\"2016-12-07 05:21:45 +0100 (Wed, 07 Dec 2016)\");\n script_cve_id(\"CVE-2016-3092\");\n script_tag(name:\"cvss_base\", value:\"7.8\");\n script_tag(name:\"cvss_base_vector\", value:\"AV:N/AC:L/Au:N/C:N/I:N/A:C\");\n script_tag(name:\"qod_type\", value:\"package\");\n script_name(\"Fedora Update for tomcat FEDORA-2016-f4a443888b\");\n script_tag(name:\"summary\", value:\"The remote host is missing an update for the 'tomcat'\n package(s) announced via the referenced advisory.\");\n script_tag(name:\"vuldetect\", value:\"Checks if a vulnerable version is present on the target host.\");\n script_tag(name:\"affected\", value:\"tomcat on Fedora 25\");\n script_tag(name:\"solution\", value:\"Please install the updated package(s).\");\n script_xref(name:\"FEDORA\", value:\"2016-f4a443888b\");\n script_xref(name:\"URL\", value:\"https://lists.fedoraproject.org/archives/list/package-announce%40lists.fedoraproject.org/message/XBWTCYHQKGXFYKOKA5MPMGPIR4WA3FS3\");\n script_tag(name:\"solution_type\", value:\"VendorFix\");\n script_category(ACT_GATHER_INFO);\n script_copyright(\"Copyright (C) 2016 Greenbone Networks GmbH\");\n script_family(\"Fedora Local Security Checks\");\n script_dependencies(\"gather-package-list.nasl\");\n script_mandatory_keys(\"ssh/login/fedora\", \"ssh/login/rpms\", re:\"ssh/login/release=FC25\");\n\n exit(0);\n}\n\ninclude(\"revisions-lib.inc\");\ninclude(\"pkg-lib-rpm.inc\");\n\nrelease = rpm_get_ssh_release();\nif(!release)\n exit(0);\n\nres = \"\";\n\nif(release == \"FC25\")\n{\n\n if ((res = isrpmvuln(pkg:\"tomcat\", rpm:\"tomcat~8.0.36~2.fc25\", rls:\"FC25\")) != NULL)\n {\n security_message(data:res);\n exit(0);\n }\n\n if (__pkg_match) exit(99);\n exit(0);\n}", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "fedora": [{"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. ", "modified": "2016-09-01T17:01:05", "published": "2016-09-01T17:01:05", "id": "FEDORA:44AA5603A529", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 24 Update: tomcat-8.0.36-2.fc24", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. ", "modified": "2016-09-01T18:56:38", "published": "2016-09-01T18:56:38", "id": "FEDORA:CF0AC608B5E3", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 23 Update: tomcat-8.0.36-2.fc23", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-21T08:17:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Tomcat is the servlet container that is used in the official Reference Implementation for the Java Servlet and JavaServer Pages technologies. The Java Servlet and JavaServer Pages specifications are developed by Sun under the Java Community Process. Tomcat is developed in an open and participatory environment and released under the Apache Software License version 2.0. Tomcat is intended to be a collaboration of the best-of-breed developers from around the world. ", "modified": "2016-09-01T13:43:39", "published": "2016-09-01T13:43:39", "id": "FEDORA:77E4F6087EA4", "href": "", "type": "fedora", "title": "[SECURITY] Fedora 25 Update: tomcat-8.0.36-2.fc25", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "atlassian": [{"lastseen": "2017-03-22T18:16:53", "bulletinFamily": "software", "cvelist": ["CVE-2016-3092"], "edition": 1, "description": "Current version of Tomcat 8.0.33 is vulernable to http://www.cvedetails.com/cve/CVE-2016-3092/\r\n\r\nWe need to upgrade the version we package with JIRA to address that vulnerability.", "modified": "2017-01-09T23:06:40", "published": "2016-07-14T14:22:05", "id": "ATLASSIAN:JRA-61885", "href": "https://jira.atlassian.com/browse/JRA-61885", "title": "Upgrade Tomcat to 8.0.36 or later", "type": "atlassian", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}, {"lastseen": "2019-08-22T00:59:59", "bulletinFamily": "software", "cvelist": ["CVE-2016-3092"], "description": "This is to mitigate CVE-2016-3092\r\n\r\nSee https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2016-3092 for details", "edition": 5, "modified": "2019-08-21T00:26:45", "published": "2016-07-20T08:22:15", "id": "ATLASSIAN:BSERV-8977", "href": "https://jira.atlassian.com/browse/BSERV-8977", "title": "Upgrade commons-fileupload to version >= 1.3.2", "type": "atlassian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-12-24T14:35:23", "bulletinFamily": "software", "cvelist": ["CVE-2016-3092"], "description": "Current version of Tomcat 8.0.33 is vulernable to http://www.cvedetails.com/cve/CVE-2016-3092/\r\n\r\nWe need to upgrade the version we package with JIRA to address that vulnerability.", "edition": 12, "modified": "2019-08-09T14:44:15", "published": "2016-07-14T14:22:05", "id": "ATLASSIAN:JRASERVER-61885", "href": "https://jira.atlassian.com/browse/JRASERVER-61885", "title": "Upgrade Tomcat to 8.0.36 or later", "type": "atlassian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "redhat": [{"lastseen": "2019-08-13T18:46:46", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.\n\nThis release serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.10. It includes bug fixes and enhancements. \n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 5 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.\n\nSecurity Fix(es):\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)", "modified": "2016-10-17T22:15:32", "published": "2016-10-17T22:09:40", "id": "RHSA-2016:2070", "href": "https://access.redhat.com/errata/RHSA-2016:2070", "type": "redhat", "title": "(RHSA-2016:2070) Moderate: Red Hat JBoss Enterprise Application Platform 6.4.11 update on RHEL 5", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:44:43", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java EE applications. It is based on JBoss Application Server 7 and incorporates multiple open-source projects to provide a complete Java EE platform solution.\n\nSecurity Fix(es):\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\nEnhancement(s):\n\n* The jboss-ec2-eap packages provide scripts for Red Hat JBoss Enterprise Application Platform running on the Amazon Web Services (AWS) Elastic Compute Cloud (EC2). With this update, the packages have been updated to ensure compatibility with Red Hat JBoss Enterprise Application Platform 6.4.11.\n\nUsers of EAP 6.4.10 jboss-ec2-eap are advised to upgrade to these updated packages, which add this enhancement.", "modified": "2018-06-07T02:39:04", "published": "2016-10-17T22:55:44", "id": "RHSA-2016:2072", "href": "https://access.redhat.com/errata/RHSA-2016:2072", "type": "redhat", "title": "(RHSA-2016:2072) Moderate: jboss-ec2-eap security and enhancement update for EAP 6.4.11", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:55", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. \n\nThis release serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.10. It includes bug fixes and enhancements. Documentation for these changes will be available shortly from the Red Hat JBoss Enterprise Application Platform 6.4.11 Release Notes, linked to in the References. \n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 7 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.\n\nSecurity Fix(es):\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)", "modified": "2018-03-19T16:13:49", "published": "2016-10-17T22:09:27", "id": "RHSA-2016:2069", "href": "https://access.redhat.com/errata/RHSA-2016:2069", "type": "redhat", "title": "(RHSA-2016:2069) Moderate: Red Hat JBoss Enterprise Application Platform 6.4.11 update on RHEL 7", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:44:58", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7. \n\nThis release serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.10. It includes bug fixes and enhancements. Documentation for these changes will be available shortly from the Red Hat JBoss Enterprise Application Platform 6.4.11 Release Notes, linked to in the References. \n\nAll users of Red Hat JBoss Enterprise Application Platform 6.4 on Red Hat Enterprise Linux 6 are advised to upgrade to these updated packages. The JBoss server process must be restarted for the update to take effect.\n\nSecurity Fix(es):\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)", "modified": "2018-06-07T02:39:08", "published": "2016-10-17T22:09:14", "id": "RHSA-2016:2068", "href": "https://access.redhat.com/errata/RHSA-2016:2068", "type": "redhat", "title": "(RHSA-2016:2068) Moderate: Red Hat JBoss Enterprise Application Platform 6.4.11 update on RHEL 6", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T14:35:10", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Red Hat JBoss Enterprise Application Platform 6 is a platform for Java applications based on JBoss Application Server 7.\n\nThis release of Red Hat JBoss Enterprise Application Platform 6.4.11 serves as a replacement for Red Hat JBoss Enterprise Application Platform 6.4.10, and includes bug fixes and enhancements. Documentation for these changes will be available shortly from the Red Hat JBoss Enterprise Application Platform 6.4.11 Release Notes, linked to in the References. \n\nSecurity Fix(es):\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)", "modified": "2019-02-20T17:29:07", "published": "2016-10-17T22:09:50", "id": "RHSA-2016:2071", "href": "https://access.redhat.com/errata/RHSA-2016:2071", "type": "redhat", "title": "(RHSA-2016:2071) Moderate: Red Hat JBoss Enterprise Application Platform 6.4.11 update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T14:33:40", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5346", "CVE-2015-5351", "CVE-2016-0706", "CVE-2016-0714", "CVE-2016-0763", "CVE-2016-3092"], "description": "This release of Red Hat JBoss Web Server 2.1.2 serves as a replacement for\nRed Hat JBoss Web Server 2.1.1. It contains security fixes for the Tomcat 7 component. Only users of the Tomcat 7 component in JBoss Web Server need to apply the fixes delivered in this release.\n\nSecurity Fix(es):\n\n* A CSRF flaw was found in Tomcat's the index pages for the Manager and Host Manager applications. These applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to perform a CSRF attack. (CVE-2015-5351)\n\n* It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session. (CVE-2016-0714)\n\n* A security manager bypass flaw was found in Tomcat that could allow remote, authenticated users to access arbitrary application data, potentially resulting in a denial of service. (CVE-2016-0763)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* A session fixation flaw was found in the way Tomcat recycled the requestedSessionSSL field. If at least one web application was configured to use the SSL session ID as the HTTP session ID, an attacker could reuse a previously used session ID for further requests. (CVE-2015-5346)\n\n* It was found that Tomcat allowed the StatusManagerServlet to be loaded by a web application when a security manager was configured. This allowed a web application to list all deployed web applications and expose sensitive information such as session IDs. (CVE-2016-0706)", "modified": "2017-07-25T00:20:10", "published": "2016-11-18T01:28:48", "id": "RHSA-2016:2808", "href": "https://access.redhat.com/errata/RHSA-2016:2808", "type": "redhat", "title": "(RHSA-2016:2808) Important: Red Hat JBoss Web Server 2.1.2 security update for Tomcat 7", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:47:00", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5346", "CVE-2015-5351", "CVE-2016-0706", "CVE-2016-0714", "CVE-2016-0763", "CVE-2016-3092"], "description": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThis release of Red Hat JBoss Web Server 2.1.2 serves as a replacement for Red Hat JBoss Web Server 2.1.1. It contains security fixes for the Tomcat 7 component. Only users of the Tomcat 7 component in JBoss Web Server need to apply the fixes delivered in this release.\n\nSecurity Fix(es):\n\n* A CSRF flaw was found in Tomcat's the index pages for the Manager and Host Manager applications. These applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to perform a CSRF attack. (CVE-2015-5351)\n\n* It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session. (CVE-2016-0714)\n\n* A security manager bypass flaw was found in Tomcat that could allow remote, authenticated users to access arbitrary application data, potentially resulting in a denial of service. (CVE-2016-0763)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* A session fixation flaw was found in the way Tomcat recycled the requestedSessionSSL field. If at least one web application was configured to use the SSL session ID as the HTTP session ID, an attacker could reuse a previously used session ID for further requests. (CVE-2015-5346)\n\n* It was found that Tomcat allowed the StatusManagerServlet to be loaded by a web application when a security manager was configured. This allowed a web application to list all deployed web applications and expose sensitive information such as session IDs. (CVE-2016-0706)", "modified": "2018-06-07T02:42:48", "published": "2016-11-18T01:28:33", "id": "RHSA-2016:2807", "href": "https://access.redhat.com/errata/RHSA-2016:2807", "type": "redhat", "title": "(RHSA-2016:2807) Important: Red Hat JBoss Web Server 2.1.2 security update for Tomcat 7", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-08-13T18:46:37", "bulletinFamily": "unix", "cvelist": ["CVE-2014-0230", "CVE-2015-5174", "CVE-2015-5345", "CVE-2015-5351", "CVE-2016-0706", "CVE-2016-0714", "CVE-2016-0763", "CVE-2016-3092"], "description": "Apache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThe following packages have been upgraded to a newer upstream version: tomcat (7.0.69). (BZ#1287928)\n\nSecurity Fix(es):\n\n* A CSRF flaw was found in Tomcat's the index pages for the Manager and Host Manager applications. These applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to perform a CSRF attack. (CVE-2015-5351)\n\n* It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session. (CVE-2016-0714)\n\n* A security manager bypass flaw was found in Tomcat that could allow remote, authenticated users to access arbitrary application data, potentially resulting in a denial of service. (CVE-2016-0763)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* A directory traversal flaw was found in Tomcat's RequestUtil.java. A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/..' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call. (CVE-2015-5174)\n\n* It was found that Tomcat could reveal the presence of a directory even when that directory was protected by a security constraint. A user could make a request to a directory via a URL not ending with a slash and, depending on whether Tomcat redirected that request, could confirm whether that directory existed. (CVE-2015-5345)\n\n* It was found that Tomcat allowed the StatusManagerServlet to be loaded by a web application when a security manager was configured. This allowed a web application to list all deployed web applications and expose sensitive information such as session IDs. (CVE-2016-0706)\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.", "modified": "2018-09-27T15:46:00", "published": "2016-11-03T10:07:16", "id": "RHSA-2016:2599", "href": "https://access.redhat.com/errata/RHSA-2016:2599", "type": "redhat", "title": "(RHSA-2016:2599) Moderate: tomcat security, bug fix, and enhancement update", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-29T14:34:47", "bulletinFamily": "unix", "cvelist": ["CVE-2016-0762", "CVE-2016-1240", "CVE-2016-3092", "CVE-2016-3427", "CVE-2016-5018", "CVE-2016-6325", "CVE-2016-6794", "CVE-2016-6796", "CVE-2016-6797", "CVE-2016-6816", "CVE-2016-8735", "CVE-2016-8745"], "description": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1.0 serves as a replacement for Red Hat JBoss Web Server 3.0.3, and includes enhancements.\n\nSecurity Fix(es):\n\n* It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation. (CVE-2016-1240)\n\n* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325)\n\n* The JmxRemoteLifecycleListener was not updated to take account of Oracle's fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance. (CVE-2016-8735)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)\n\n* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018)\n\n* It was discovered that when a SecurityManager is configured Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796)\n\n* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)\n\nThe CVE-2016-6325 issue was discovered by Red Hat Product Security.\n\nEnhancement(s):\n\n* This enhancement update adds the Red Hat JBoss Web Server 3.1.0. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server.\n\nUsers of Red Hat JBoss Web Server are advised to upgrade to these updated packages, which add this enhancement.", "modified": "2017-07-25T00:20:14", "published": "2017-03-07T23:57:09", "id": "RHSA-2017:0457", "href": "https://access.redhat.com/errata/RHSA-2017:0457", "type": "redhat", "title": "(RHSA-2017:0457) Important: Red Hat JBoss Web Server security and enhancement update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}, {"lastseen": "2019-08-13T18:45:45", "bulletinFamily": "unix", "cvelist": ["CVE-2016-0762", "CVE-2016-1240", "CVE-2016-3092", "CVE-2016-3427", "CVE-2016-5018", "CVE-2016-6325", "CVE-2016-6794", "CVE-2016-6796", "CVE-2016-6797", "CVE-2016-6816", "CVE-2016-8735", "CVE-2016-8745"], "description": "Red Hat JBoss Web Server is a fully integrated and certified set of components for hosting Java web applications. It is comprised of the Apache HTTP Server, the Apache Tomcat Servlet container, Apache Tomcat Connector (mod_jk), JBoss HTTP Connector (mod_cluster), Hibernate, and the Tomcat Native library.\n\nThis release of Red Hat JBoss Web Server 3.1.0 serves as a replacement for Red Hat JBoss Web Server 3.0.3, and includes enhancements.\n\nSecurity Fix(es):\n\n* It was reported that the Tomcat init script performed unsafe file handling, which could result in local privilege escalation. (CVE-2016-1240)\n\n* It was discovered that the Tomcat packages installed certain configuration files read by the Tomcat initialization script as writeable to the tomcat group. A member of the group or a malicious web application deployed on Tomcat could use this flaw to escalate their privileges. (CVE-2016-6325)\n\n* The JmxRemoteLifecycleListener was not updated to take account of Oracle's fix for CVE-2016-3427. JMXRemoteLifecycleListener is only included in EWS 2.x and JWS 3.x source distributions. If you deploy a Tomcat instance built from source, using the EWS 2.x, or JWS 3.x distributions, an attacker could use this flaw to launch a remote code execution attack on your deployed instance. (CVE-2016-8735)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own. (CVE-2016-6816)\n\n* A bug was discovered in the error handling of the send file code for the NIO HTTP connector. This led to the current Processor object being added to the Processor cache multiple times allowing information leakage between requests including, and not limited to, session ID and the response body. (CVE-2016-8745)\n\n* The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. (CVE-2016-0762)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. (CVE-2016-5018)\n\n* It was discovered that when a SecurityManager is configured Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. (CVE-2016-6794)\n\n* It was discovered that a malicious web application could bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. (CVE-2016-6796)\n\n* It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. (CVE-2016-6797)\n\nThe CVE-2016-6325 issue was discovered by Red Hat Product Security.\n\nEnhancement(s):\n\nThis enhancement update adds the Red Hat JBoss Web Server 3.1.0 packages to Red Hat Enterprise Linux 6. These packages provide a number of enhancements over the previous version of Red Hat JBoss Web Server. (JIRA#JWS-267)\n\nUsers of Red Hat JBoss Web Server are advised to upgrade to these updated packages, which add this enhancement.", "modified": "2018-06-07T02:42:54", "published": "2015-11-12T23:40:07", "id": "RHSA-2017:0455", "href": "https://access.redhat.com/errata/RHSA-2017:0455", "type": "redhat", "title": "(RHSA-2017:0455) Important: Red Hat JBoss Web Server 3.1.0 security and enhancement update", "cvss": {"score": 10.0, "vector": "AV:N/AC:L/Au:N/C:C/I:C/A:C"}}], "debian": [{"lastseen": "2020-08-12T01:05:34", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3611-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nJune 30, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : libcommons-fileupload-java\nCVE ID : CVE-2016-3092\n\nThe TERASOLUNA Framework Development Team discovered a denial of service\nvulnerability in Apache Commons FileUpload, a package to make it\neasy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.\n\nFor the stable distribution (jessie), this problem has been fixed in\nversion 1.3.1-1+deb8u1.\n\nFor the testing distribution (stretch), this problem has been fixed\nin version 1.3.2-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 1.3.2-1.\n\nWe recommend that you upgrade your libcommons-fileupload-java packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 10, "modified": "2016-06-30T08:44:18", "published": "2016-06-30T08:44:18", "id": "DEBIAN:DSA-3611-1:F53EF", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2016/msg00189.html", "title": "[SECURITY] [DSA 3611-1] libcommons-fileupload-java security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-30T02:22:39", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Package : tomcat7\nVersion : 7.0.28-4+deb7u5\nCVE ID : CVE-2016-3092\n\n\nA denial of service vulnerability was identified in Commons FileUpload\nthat occurred when the length of the multipart boundary was just below\nthe size of the buffer (4096 bytes) used to read the uploaded file.\nThis caused the file upload process to take several orders of\nmagnitude longer than if the boundary was the typical tens of bytes long.\n\nApache Tomcat uses a package renamed copy of Apache Commons FileUpload\nto implement the file upload requirements of the Servlet specification\nand was therefore also vulnerable to the denial of service vulnerability.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n7.0.28-4+deb7u5.\n\nWe recommend that you upgrade your tomcat7 packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 3, "modified": "2016-06-26T18:59:34", "published": "2016-06-26T18:59:34", "id": "DEBIAN:DLA-529-1:DC84D", "href": "https://lists.debian.org/debian-lts-announce/2016/debian-lts-announce-201606/msg00030.html", "title": "[SECURITY] [DLA 529-1] tomcat7 security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-12T01:04:04", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3614-1 security@debian.org\nhttps://www.debian.org/security/ Salvatore Bonaccorso\nJuly 02, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : tomcat7\nCVE ID : CVE-2016-3092\n\nThe TERASOLUNA Framework Development Team discovered a denial of service\nvulnerability in Apache Commons FileUpload, a package to make it\neasy to add robust, high-performance, file upload capability to servlets\nand web applications. A remote attacker can take advantage of this flaw\nby sending file upload requests that cause the HTTP server using the\nApache Commons Fileupload library to become unresponsive, preventing the\nserver from servicing other requests.\n\nApache Tomcat uses a package renamed copy of Apache Commons FileUpload\nto implement the file upload requirements of the Servlet specification\nand is therefore also vulnerable to the denial of service vulnerability.\n\nFor the stable distribution (jessie), this problem has been fixed in\nversion 7.0.56-3+deb8u3.\n\nFor the testing distribution (stretch), this problem has been fixed\nin version 7.0.70-1.\n\nFor the unstable distribution (sid), this problem has been fixed in\nversion 7.0.70-1.\n\nWe recommend that you upgrade your tomcat7 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 10, "modified": "2016-07-02T12:54:34", "published": "2016-07-02T12:54:34", "id": "DEBIAN:DSA-3614-1:AC7F6", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2016/msg00193.html", "title": "[SECURITY] [DSA 3614-1] tomcat7 security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2019-05-30T02:22:13", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "Package : libcommons-fileupload-java\nVersion : 1.2.2-1+deb7u3\nCVE ID : CVE-2016-3092\n\n\nA denial of service vulnerability was identified in Commons FileUpload\nthat occurred when the length of the multipart boundary was just below\nthe size of the buffer (4096 bytes) used to read the uploaded file.\nThis caused the file upload process to take several orders of\nmagnitude longer than if the boundary was the typical tens of bytes long.\n\nFor Debian 7 "Wheezy", these problems have been fixed in version\n1.2.2-1+deb7u3.\n\nWe recommend that you upgrade your libcommons-fileupload-java packages.\n\nFurther information about Debian LTS security advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://wiki.debian.org/LTS\n", "edition": 3, "modified": "2016-06-26T18:55:08", "published": "2016-06-26T18:55:08", "id": "DEBIAN:DLA-528-1:BE307", "href": "https://lists.debian.org/debian-lts-announce/2016/debian-lts-announce-201606/msg00029.html", "title": "[SECURITY] [DLA 528-1] libcommons-fileupload-java security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-08-12T01:05:36", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5351", "CVE-2016-0714", "CVE-2016-3092", "CVE-2015-5345", "CVE-2016-0763", "CVE-2015-5346", "CVE-2015-5174", "CVE-2016-0706"], "description": "- -------------------------------------------------------------------------\nDebian Security Advisory DSA-3609-1 security@debian.org\nhttps://www.debian.org/security/ Moritz Muehlenhoff\nJune 29, 2016 https://www.debian.org/security/faq\n- -------------------------------------------------------------------------\n\nPackage : tomcat8\nCVE ID : CVE-2015-5174 CVE-2015-5345 CVE-2015-5346 CVE-2015-5351 \n CVE-2016-0706 CVE-2016-0714 CVE-2016-0763 CVE-2016-3092\n\nMultiple security vulnerabilities have been discovered in the Tomcat\nservlet and JSP engine, which may result in information disclosure, the\nbypass of CSRF protections, bypass of the SecurityManager or denial of\nservice.\n\nFor the stable distribution (jessie), these problems have been fixed in\nversion 8.0.14-1+deb8u2.\n\nFor the unstable distribution (sid), these problems have been fixed in\nversion 8.0.36-1.\n\nWe recommend that you upgrade your tomcat8 packages.\n\nFurther information about Debian Security Advisories, how to apply\nthese updates to your system and frequently asked questions can be\nfound at: https://www.debian.org/security/\n\nMailing list: debian-security-announce@lists.debian.org\n", "edition": 8, "modified": "2016-06-29T19:54:39", "published": "2016-06-29T19:54:39", "id": "DEBIAN:DSA-3609-1:174EB", "href": "https://lists.debian.org/debian-security-announce/debian-security-announce-2016/msg00187.html", "title": "[SECURITY] [DSA 3609-1] tomcat8 security update", "type": "debian", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "freebsd": [{"lastseen": "2019-05-29T18:32:40", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "\nMark Thomas reports:\n\nCVE-2016-3092 is a denial of service vulnerability that has been\n\t corrected in the Apache Commons FileUpload component. It occurred\n\t when the length of the multipart boundary was just below the size of\n\t the buffer (4096 bytes) used to read the uploaded file. This caused\n\t the file upload process to take several orders of magnitude longer\n\t than if the boundary length was the typical tens of bytes.\n\n", "edition": 5, "modified": "2017-08-10T00:00:00", "published": "2016-06-20T00:00:00", "id": "CBCEEB49-3BC7-11E6-8E82-002590263BF5", "href": "https://vuxml.freebsd.org/freebsd/cbceeb49-3bc7-11e6-8e82-002590263bf5.html", "title": "Apache Commons FileUpload -- denial of service (DoS) vulnerability", "type": "freebsd", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2017-03-18T03:16:15", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "\nJochen Wiedmann reports:\n\nA malicious client can send file upload requests that cause\n\t the HTTP server using the Apache Commons Fileupload library to become\n\t unresponsive, preventing the server from servicing other requests.\n\n", "edition": 2, "modified": "2017-03-18T00:00:00", "published": "2016-06-21T00:00:00", "id": "61B8C359-4AAB-11E6-A7BD-14DAE9D210B8", "href": "https://vuxml.freebsd.org/freebsd/61b8c359-4aab-11e6-a7bd-14dae9d210b8.html", "type": "freebsd", "title": "Apache Commons FileUpload -- denial of service", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "jvn": [{"lastseen": "2019-05-29T19:49:13", "bulletinFamily": "info", "cvelist": ["CVE-2016-3092"], "description": "\n ## Description\n\nApache Commons FileUpload provided by the Apache Software Foundation contains a flaw when processing multi-part requests, which may lead to a denial-of-service (DoS).\n\n ## Impact\n\nProcessing a specially crafted request may result in the server's CPU resources to be exhausted.\n\n ## Solution\n\n**Apply the update** \nUpdate to the latest version that contains a fix fot this vulnerability: \n\n * [Commons Fileupload 1.3.2](<http://commons.apache.org/proper/commons-fileupload/download_fileupload.cgi>)\n * [Tomcat 9.0.0M8](<http://www.apache.org/dist/tomcat/tomcat-9/v9.0.0.M8/>)\n * [Tomcat 8.5.3](<http://www.apache.org/dist/tomcat/tomcat-8/v8.5.3/>)\n * [Tomcat 8.0.36](<http://www.apache.org/dist/tomcat/tomcat-8/v8.0.36/>)\n * [Tomcat 7.0.70](<http://www.apache.org/dist/tomcat/tomcat-7/v7.0.70/>)\nUser of Apache Struts should replace the copy of Commons FileUpload with the fixed version. \n \n**Apply a workaround** \nUntil an update can be applied, the following workaround may mitigate the effect of this vulnerability. \n\n * Llimit the maximum size of HTTP requests\nAccording to the developer, Apache Httpd contains the LimitRequestFieldSize directive and Apache Tomcat contains the maxHttpHeaderSize attribute in their respective configuration files to limit the maximum size for HTTP requests. Also it is stated that limiting the maximum size to 2048 bytes will mitigate this vulnerability. For more details, refer to the information provided by the developer. \n\n ## Products Affected\n\n * Commons FileUpload 1.3 to 1.3.1\n * Commons FileUpload 1.2 to 1.2.2\n * Tomcat 9.0.0.M1 to 9.0.0M6\n * Tomcat 8.5.0 to 8.5.2\n * Tomcat 8.0.0.RC1 to 8.0.35\n * Tomcat 7.0.0 to 7.0.69\n * Struts 2.5.x and earlier\nAccording to the developer, the unsupported versions of Commons FileUpload 1.0.x and 1.1.x may also be affected. \n \nThe developer also states that Apache Commons FileUpload is widely used for multiple Apache products, therefore, multiple Apache products other than Tomcat and Struts 2 may be affected by this vulnerability. \nAccording to the developer, the following products may be affected. \n\n * Jenkins\n * JSPWiki\n * JXP\n * Lucene-Solr\n * onemind-commons\n * Spring\n * Stapler\n * Struts 1\n * WSDL2c\n", "edition": 5, "modified": "2018-01-26T00:00:00", "published": "2016-06-30T00:00:00", "id": "JVN:89379547", "href": "http://jvn.jp/en/jp/JVN89379547/index.html", "title": "JVN#89379547: Apache Commons FileUpload vulnerable to denial-of-service (DoS)", "type": "jvn", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "github": [{"lastseen": "2020-03-10T23:26:06", "bulletinFamily": "software", "cvelist": ["CVE-2016-3092"], "description": "The MultipartStream class in Apache Commons Fileupload before 1.3.2, as used in Apache Tomcat 7.x before 7.0.70, 8.x before 8.0.36, 8.5.x before 8.5.3, and 9.x before 9.0.0.M7 and other products, allows remote attackers to cause a denial of service (CPU consumption) via a long boundary string.", "edition": 2, "modified": "2019-07-03T21:02:05", "published": "2018-12-21T17:47:47", "id": "GHSA-FVM3-CFVJ-GXQQ", "href": "https://github.com/advisories/GHSA-fvm3-cfvj-gxqq", "title": "High severity vulnerability that affects commons-fileupload:commons-fileupload", "type": "github", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "amazon": [{"lastseen": "2020-11-10T12:36:53", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "**Issue Overview:**\n\nA denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long.\n\n \n**Affected Packages:** \n\n\ntomcat7, tomcat8\n\n \n**Issue Correction:** \nRun _yum update tomcat7_ to update your system. \nRun _yum update tomcat8_ to update your system. \n\n\n \n\n\n**New Packages:**\n \n \n noarch: \n tomcat7-servlet-3.0-api-7.0.70-1.18.amzn1.noarch \n tomcat7-docs-webapp-7.0.70-1.18.amzn1.noarch \n tomcat7-log4j-7.0.70-1.18.amzn1.noarch \n tomcat7-jsp-2.2-api-7.0.70-1.18.amzn1.noarch \n tomcat7-javadoc-7.0.70-1.18.amzn1.noarch \n tomcat7-admin-webapps-7.0.70-1.18.amzn1.noarch \n tomcat7-el-2.2-api-7.0.70-1.18.amzn1.noarch \n tomcat7-webapps-7.0.70-1.18.amzn1.noarch \n tomcat7-lib-7.0.70-1.18.amzn1.noarch \n tomcat7-7.0.70-1.18.amzn1.noarch \n tomcat8-lib-8.0.36-1.62.amzn1.noarch \n tomcat8-el-3.0-api-8.0.36-1.62.amzn1.noarch \n tomcat8-jsp-2.3-api-8.0.36-1.62.amzn1.noarch \n tomcat8-webapps-8.0.36-1.62.amzn1.noarch \n tomcat8-8.0.36-1.62.amzn1.noarch \n tomcat8-docs-webapp-8.0.36-1.62.amzn1.noarch \n tomcat8-log4j-8.0.36-1.62.amzn1.noarch \n tomcat8-javadoc-8.0.36-1.62.amzn1.noarch \n tomcat8-servlet-3.1-api-8.0.36-1.62.amzn1.noarch \n tomcat8-admin-webapps-8.0.36-1.62.amzn1.noarch \n \n src: \n tomcat7-7.0.70-1.18.amzn1.src \n tomcat8-8.0.36-1.62.amzn1.src \n \n \n", "edition": 4, "modified": "2016-08-17T13:30:00", "published": "2016-08-17T13:30:00", "id": "ALAS-2016-736", "href": "https://alas.aws.amazon.com/ALAS-2016-736.html", "title": "Medium: tomcat7, tomcat8", "type": "amazon", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "ubuntu": [{"lastseen": "2020-07-02T11:45:18", "bulletinFamily": "unix", "cvelist": ["CVE-2016-3092"], "description": "It was discovered that the Tomcat Fileupload library incorrectly handled \ncertain upload requests. A remote attacker could possibly use this issue to \ncause a denial of service.", "edition": 5, "modified": "2016-07-06T00:00:00", "published": "2016-07-06T00:00:00", "id": "USN-3027-1", "href": "https://ubuntu.com/security/notices/USN-3027-1", "title": "Tomcat vulnerability", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}, {"lastseen": "2020-07-02T11:35:07", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5351", "CVE-2016-0714", "CVE-2016-3092", "CVE-2015-5345", "CVE-2016-0763", "CVE-2015-5346", "CVE-2015-5174", "CVE-2016-0706"], "description": "It was discovered that Tomcat incorrectly handled pathnames used by web \napplications in a getResource, getResourceAsStream, or getResourcePaths \ncall. A remote attacker could use this issue to possibly list a parent \ndirectory . This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and \nUbuntu 15.10. (CVE-2015-5174)\n\nIt was discovered that the Tomcat mapper component incorrectly handled \nredirects. A remote attacker could use this issue to determine the \nexistence of a directory. This issue only affected Ubuntu 12.04 LTS, \nUbuntu 14.04 LTS and Ubuntu 15.10. (CVE-2015-5345)\n\nIt was discovered that Tomcat incorrectly handled different session \nsettings when multiple versions of the same web application was deployed. A \nremote attacker could possibly use this issue to hijack web sessions. This \nissue only affected Ubuntu 14.04 LTS and Ubuntu 15.10. (CVE-2015-5346)\n\nIt was discovered that the Tomcat Manager and Host Manager applications \nincorrectly handled new requests. A remote attacker could possibly use this \nissue to bypass CSRF protection mechanisms. This issue only affected Ubuntu \n14.04 LTS and Ubuntu 15.10. (CVE-2015-5351)\n\nIt was discovered that Tomcat did not place StatusManagerServlet on the \nRestrictedServlets list. A remote attacker could possibly use this issue to \nread arbitrary HTTP requests, including session ID values. This issue only \naffected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. \n(CVE-2016-0706)\n\nIt was discovered that the Tomcat session-persistence implementation \nincorrectly handled session attributes. A remote attacker could possibly \nuse this issue to execute arbitrary code in a privileged context. This \nissue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. \n(CVE-2016-0714)\n\nIt was discovered that the Tomcat setGlobalContext method incorrectly \nchecked if callers were authorized. A remote attacker could possibly use \nthis issue to read or wite to arbitrary application data, or cause a denial \nof service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and \nUbuntu 15.10. (CVE-2016-0763)\n\nIt was discovered that the Tomcat Fileupload library incorrectly handled \ncertain upload requests. A remote attacker could possibly use this issue to \ncause a denial of service. (CVE-2016-3092)", "edition": 5, "modified": "2016-07-05T00:00:00", "published": "2016-07-05T00:00:00", "id": "USN-3024-1", "href": "https://ubuntu.com/security/notices/USN-3024-1", "title": "Tomcat vulnerabilities", "type": "ubuntu", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "centos": [{"lastseen": "2019-12-20T18:26:04", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5351", "CVE-2014-0230", "CVE-2016-0714", "CVE-2016-3092", "CVE-2015-5345", "CVE-2016-0763", "CVE-2015-5174", "CVE-2016-0706"], "description": "**CentOS Errata and Security Advisory** CESA-2016:2599\n\n\nApache Tomcat is a servlet container for the Java Servlet and JavaServer Pages (JSP) technologies.\n\nThe following packages have been upgraded to a newer upstream version: tomcat (7.0.69). (BZ#1287928)\n\nSecurity Fix(es):\n\n* A CSRF flaw was found in Tomcat's the index pages for the Manager and Host Manager applications. These applications included a valid CSRF token when issuing a redirect as a result of an unauthenticated request to the root of the web application. This token could then be used by an attacker to perform a CSRF attack. (CVE-2015-5351)\n\n* It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session. (CVE-2016-0714)\n\n* A security manager bypass flaw was found in Tomcat that could allow remote, authenticated users to access arbitrary application data, potentially resulting in a denial of service. (CVE-2016-0763)\n\n* A denial of service vulnerability was identified in Commons FileUpload that occurred when the length of the multipart boundary was just below the size of the buffer (4096 bytes) used to read the uploaded file if the boundary was the typical tens of bytes long. (CVE-2016-3092)\n\n* A directory traversal flaw was found in Tomcat's RequestUtil.java. A remote, authenticated user could use this flaw to bypass intended SecurityManager restrictions and list a parent directory via a '/..' in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call. (CVE-2015-5174)\n\n* It was found that Tomcat could reveal the presence of a directory even when that directory was protected by a security constraint. A user could make a request to a directory via a URL not ending with a slash and, depending on whether Tomcat redirected that request, could confirm whether that directory existed. (CVE-2015-5345)\n\n* It was found that Tomcat allowed the StatusManagerServlet to be loaded by a web application when a security manager was configured. This allowed a web application to list all deployed web applications and expose sensitive information such as session IDs. (CVE-2016-0706)\n\nAdditional Changes:\n\nFor detailed information on changes in this release, see the Red Hat Enterprise Linux 7.3 Release Notes linked from the References section.\n\n**Merged security bulletin from advisories:**\nhttp://lists.centos.org/pipermail/centos-cr-announce/2016-November/003537.html\n\n**Affected packages:**\ntomcat\ntomcat-admin-webapps\ntomcat-docs-webapp\ntomcat-el-2.2-api\ntomcat-javadoc\ntomcat-jsp-2.2-api\ntomcat-jsvc\ntomcat-lib\ntomcat-servlet-3.0-api\ntomcat-webapps\n\n**Upstream details at:**\nhttps://rhn.redhat.com/errata/RHSA-2016-2599.html", "edition": 4, "modified": "2016-11-25T15:49:52", "published": "2016-11-25T15:49:52", "href": "http://lists.centos.org/pipermail/centos-cr-announce/2016-November/003537.html", "id": "CESA-2016:2599", "title": "tomcat security update", "type": "centos", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "oraclelinux": [{"lastseen": "2019-05-29T18:34:51", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5351", "CVE-2016-0714", "CVE-2016-3092", "CVE-2015-5345", "CVE-2016-0763", "CVE-2015-5346", "CVE-2015-5174", "CVE-2014-7810", "CVE-2016-0706"], "description": "[0:7.0.69-10]\n- Related: rhbz#1368122\n[0:7.0.69-9]\n- Resolves: rhbz#1362213 Tomcat: CGI sets environmental variable based on user supplied Proxy request header\n- Resolves: rhbz#1368122\n[0:7.0.69-7]\n- Resolves: rhbz#1362545\n[0:7.0.69-6]\n- Related: rhbz#1201409 Added /etc/sysconfig/tomcat to the systemd unit for tomcat-jsvc.service\n[0:7.0.69-5]\n- Resolves: rhbz#1347860 The systemd service unit does not allow tomcat to shut down gracefully\n[0:7.0.69-4]\n- Resolves: rhbz#1350438 CVE-2016-3092 tomcat: Usage of vulnerable FileUpload package can result in denial of service\n[0:7.0.69-3]\n- Resolves: rhbz#1347774 The security manager doesn't work correctly (JSPs cannot be compiled)\n[0:7.0.69-2]\n- Rebase Resolves: rhbz#1311622 Getting NoSuchElementException while handling attributes with empty string value in tomcat\n- Rebase Resolves: rhbz#1320853 Add HSTS support\n- Rebase Resolves: rhbz#1293292 CVE-2014-7810 tomcat: Tomcat/JBossWeb: security manager bypass via EL expressions\n- Rebase Resolves: rhbz#1347144 CVE-2016-0706 tomcat: security manager bypass via StatusManagerServlet\n- Rebase Resolves: rhbz#1347139 CVE-2015-5346 tomcat: Session fixation\n- Rebase Resolves: rhbz#1347136 CVE-2015-5345 tomcat: directory disclosure\n- Rebase Resolves: rhbz#1347129 CVE-2015-5174 tomcat: URL Normalization issue\n- Rebase Resolves: rhbz#1347146 CVE-2016-0763 tomcat: security manager bypass via setGlobalContext()\n- Rebase Resolves: rhbz#1347142 CVE-2016-0714 tomcat: Security Manager bypass via persistence mechanisms\n- Rebase Resolves: rhbz#1347133 CVE-2015-5351 tomcat: CSRF token leak\n[0:7.0.69-1]\n- Resolves: rhbz#1287928 Rebase to tomcat 7.0.69\n- Resolves: rhbz#1327326 rpm -V tomcat fails on /var/log/tomcat/catalina.out\n- Resolves: rhbz#1277197 tomcat user has non-existing default shell set\n- Resolves: rhbz#1240279 The command tomcat-digest doesn't work with RHEL 7\n- Resolves: rhbz#1229476 Tomcat startup ONLY options\n- Resolves: rhbz#1133070 Need to include full implementation of tomcat-juli.jar and tomcat-juli-adapters.jar\n- Resolves: rhbz#1201409 Fix the broken tomcat-jsvc service unit\n- Resolves: rhbz#1221896 tomcat.service loads /etc/sysconfig/tomcat without shell expansion\n- Resolves: rhbz#1208402 Mark web.xml in tomcat-admin-webapps as config file", "edition": 4, "modified": "2016-11-09T00:00:00", "published": "2016-11-09T00:00:00", "id": "ELSA-2016-2599", "href": "http://linux.oracle.com/errata/ELSA-2016-2599.html", "title": "tomcat security, bug fix, and enhancement update", "type": "oraclelinux", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "cloudfoundry": [{"lastseen": "2019-05-29T18:32:44", "bulletinFamily": "software", "cvelist": ["CVE-2015-5351", "CVE-2016-0714", "CVE-2016-3092", "CVE-2015-5345", "CVE-2016-0763", "CVE-2015-5346", "CVE-2016-5345", "CVE-2016-5174", "CVE-2015-5174", "CVE-2016-0706", "CVE-2016-5346", "CVE-2016-5351"], "description": "USN-3024-1: tomcat6, tomcat7 vulnerabilities\n\n# \n\nMedium\n\n# Vendor\n\nCanonical Ubuntu\n\n# Versions Affected\n\n * Canonical Ubuntu 14.04 LTS \n\n# Description\n\nIt was discovered that Tomcat incorrectly handled pathnames used by web applications in a getResource, getResourceAsStream, or getResourcePaths call. A remote attacker could use this issue to possibly list a parent directory . This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ([CVE-2015-5174](<http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5174>))\n\nIt was discovered that the Tomcat mapper component incorrectly handled redirects. A remote attacker could use this issue to determine the existence of a directory. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ([CVE-2015-5345](<http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5345>))\n\nIt was discovered that Tomcat incorrectly handled different session settings when multiple versions of the same web application was deployed. A remote attacker could possibly use this issue to hijack web sessions. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.10. ([CVE-2015-5346](<http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5346>))\n\nIt was discovered that the Tomcat Manager and Host Manager applications incorrectly handled new requests. A remote attacker could possibly use this issue to bypass CSRF protection mechanisms. This issue only affected Ubuntu 14.04 LTS and Ubuntu 15.10. ([CVE-2015-5351](<http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5351>))\n\nIt was discovered that Tomcat did not place StatusManagerServlet on the RestrictedServlets list. A remote attacker could possibly use this issue to read arbitrary HTTP requests, including session ID values. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ([CVE-2016-0706](<http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0706>))\n\nIt was discovered that the Tomcat session-persistence implementation incorrectly handled session attributes. A remote attacker could possibly use this issue to execute arbitrary code in a privileged context. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ([CVE-2016-0714](<http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0714>))\n\nIt was discovered that the Tomcat setGlobalContext method incorrectly checked if callers were authorized. A remote attacker could possibly use this issue to read or wite to arbitrary application data, or cause a denial of service. This issue only affected Ubuntu 12.04 LTS, Ubuntu 14.04 LTS and Ubuntu 15.10. ([CVE-2016-0763](<http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0763>))\n\nIt was discovered that the Tomcat Fileupload library incorrectly handled certain upload requests. A remote attacker could possibly use this issue to cause a denial of service. ([CVE-2016-3092](<http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-3092>))\n\n# Affected Products and Versions\n\nSeverity is medium unless otherwise noted.\n\n * All versions of UAA prior to v3.6.0 \n * All versions of UAA BOSH Release prior to v13.0 \n\n# Mitigation\n\nOSS users are strongly encouraged to follow one of the mitigations below:\n\n * Upgrade to the latest version of cf-release [[1]](<https://github.com/cloudfoundry/cf-release/releases>)\n * For standalone UAA users upgrade UAA Release to v3.6.0 [[2]](<https://github.com/cloudfoundry/uaa/releases/tag/3.6.0>) or later, UAA BOSH Release v13 [[3]](<https://github.com/cloudfoundry/uaa-release/releases/tag/v13>) or later \n\n# References\n\n * [1] <https://github.com/cloudfoundry/cf-release/releases>\n * [2] <https://github.com/cloudfoundry/uaa/releases/tag/3.6.0>\n * [3] <https://github.com/cloudfoundry/uaa-release/releases/tag/v13>\n * <https://www.ubuntu.com/usn/usn-3024-1>\n * <http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5174>\n * <http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5345>\n * <http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5346>\n * <http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-5351>\n * <http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0706>\n * <http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0714>\n * <http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-0763>\n * <http://people.canonical.com/~ubuntu-security/cve/2016/CVE-2016-3092>\n", "edition": 5, "modified": "2017-01-19T00:00:00", "published": "2017-01-19T00:00:00", "id": "CFOUNDRY:1DFE9585B9C1AAABE38F2402F4352EFD", "href": "https://www.cloudfoundry.org/blog/usn-3024-1/", "title": "USN-3024-1: tomcat6, tomcat7 vulnerabilities | Cloud Foundry", "type": "cloudfoundry", "cvss": {"score": 7.8, "vector": "AV:N/AC:L/Au:N/C:N/I:N/A:C"}}], "suse": [{"lastseen": "2017-06-23T16:15:07", "bulletinFamily": "unix", "cvelist": ["CVE-2016-6796", "CVE-2016-3092", "CVE-2016-8745", "CVE-2016-0762", "CVE-2016-6816", "CVE-2017-5647", "CVE-2016-5388", "CVE-2016-5018", "CVE-2016-8735", "CVE-2017-5648", "CVE-2016-6794", "CVE-2016-6797"], "description": "Tomcat was updated to version 7.0.78, fixing various bugs and security\n issues.\n\n For full details see\n <a rel=\"nofollow\" href=\"https://tomcat.apache.org/tomcat-7.0-doc/changelog.html\">https://tomcat.apache.org/tomcat-7.0-doc/changelog.html</a>\n\n Security issues fixed:\n\n - CVE-2016-0762: A realm timing attack in tomcat was fixed which could\n disclose existence of users (bsc#1007854)\n - CVE-2016-3092: Usage of vulnerable FileUpload package could have\n resulted in denial of service (bsc#986359)\n - CVE-2016-5018: A security manager bypass via a Tomcat utility method\n that was accessible to web applications was fixed. (bsc#1007855)\n - CVE-2016-5388: Setting HTTP_PROXY environment variable via Proxy header\n (bsc#988489)\n - CVE-2016-6794: A tomcat system property disclosure was fixed.\n (bsc#1007857)\n - CVE-2016-6796: A tomcat security manager bypass via manipulation of the\n configuration parameters for the JSP Servlet. (bsc#1007858)\n - CVE-2016-6797: A tomcat unrestricted access to global resources via\n ResourceLinkFactory was fixed. (bsc#1007853)\n - CVE-2016-6816: A HTTP Request smuggling vulnerability due to permitting\n invalid character in HTTP requests was fixed. (bsc#1011812)\n - CVE-2016-8735: A Remote code execution vulnerability in\n JmxRemoteLifecycleListener was fixed (bsc#1011805)\n - CVE-2016-8745: A Tomcat Information Disclosure in the error handling of\n send file code for the NIO HTTP connector was fixed. (bsc#1015119)\n - CVE-2017-5647: A tomcat information disclosure in pipelined request\n processing was fixed. (bsc#1033448)\n - CVE-2017-5648: A tomcat information disclosure due to using incorrect\n facade objects was fixed (bsc#1033447)\n\n", "edition": 1, "modified": "2017-06-23T15:09:55", "published": "2017-06-23T15:09:55", "href": "http://lists.opensuse.org/opensuse-security-announce/2017-06/msg00029.html", "id": "SUSE-SU-2017:1660-1", "title": "Security update for tomcat (important)", "type": "suse", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}], "gentoo": [{"lastseen": "2017-05-28T22:26:23", "bulletinFamily": "unix", "cvelist": ["CVE-2015-5351", "CVE-2016-0714", "CVE-2016-3092", "CVE-2016-8745", "CVE-2015-5345", "CVE-2016-0763", "CVE-2017-5651", "CVE-2017-5647", "CVE-2015-5346", "CVE-2015-5174", "CVE-2016-0706", "CVE-2016-1240", "CVE-2017-5648", "CVE-2017-5650"], "description": "### Background\n\nApache Tomcat is a Servlet-3.0/JSP-2.2 Container.\n\n### Description\n\nMultiple vulnerabilities have been discovered in Tomcat. Please review the CVE identifiers referenced below for details. \n\n### Impact\n\nA remote attacker may be able to cause a Denial of Service condition, obtain sensitive information, bypass protection mechanisms and authentication restrictions. \n\nA local attacker, who is a tomcat\u2019s system user or belongs to tomcat\u2019s group, could potentially escalate privileges. \n\n### Workaround\n\nThere is no known workaround at this time.\n\n### Resolution\n\nAll Apache Tomcat users have to manually check their Tomcat runscripts to make sure that they don\u2019t use an old, vulnerable runscript. In addition: \n\nAll Apache Tomcat 7 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-servers/tomcat-7.0.70:7\"\n \n\nAll Apache Tomcat 8 users should upgrade to the latest version:\n \n \n # emerge --sync\n # emerge --ask --oneshot --verbose \">=www-servers/tomcat-8.0.36:8\"", "edition": 1, "modified": "2017-05-18T00:00:00", "published": "2017-05-18T00:00:00", "href": "https://security.gentoo.org/glsa/201705-09", "id": "GLSA-201705-09", "title": "Apache Tomcat: Multiple vulnerabilities", "type": "gentoo", "cvss": {"score": 7.8, "vector": "AV:NETWORK/AC:LOW/Au:NONE/C:NONE/I:NONE/A:COMPLETE/"}}]}