logo
DATABASE RESOURCES PRICING ABOUT US

Fixed in Apache Tomcat 9.0.0.M10

Description

**Low: Unrestricted Access to Global Resources** [CVE-2016-6797](<https://vulners.com/cve/CVE-2016-6797>) The ResourceLinkFactory did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not. This was fixed in revision [1757271](<https://svn.apache.org/viewvc?view=rev&rev=1757271>). This issue was identified by the Apache Tomcat Security Team on 18 January 2016 and made public on 27 October 2016. Affects: 9.0.0.M1 to 9.0.0.M9 **Low: Security Manager Bypass** [CVE-2016-6796](<https://vulners.com/cve/CVE-2016-6796>) A malicious web application was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet. This was fixed in revisions [1758487](<https://svn.apache.org/viewvc?view=rev&rev=1758487>) and [1763232](<https://svn.apache.org/viewvc?view=rev&rev=1763232>). This issue was identified by the Apache Tomcat Security Team on 27 December 2015 and made public on 27 October 2016. Affects: 9.0.0.M1 to 9.0.0.M9 **Low: System Property Disclosure** [CVE-2016-6794](<https://vulners.com/cve/CVE-2016-6794>) When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. Tomcat's system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible. This was fixed in revision [1754445](<https://svn.apache.org/viewvc?view=rev&rev=1754445>). This issue was identified by the Apache Tomcat Security Team on 27 December 2015 and made public on 27 October 2016. Affects: 9.0.0.M1 to 9.0.0.M9 **Low: Security Manager Bypass** [CVE-2016-5018](<https://vulners.com/cve/CVE-2016-5018>) A malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications. This was fixed in revisions [1754714](<https://svn.apache.org/viewvc?view=rev&rev=1754714>) and [1760300](<https://svn.apache.org/viewvc?view=rev&rev=1760300>). This issue was discovered by Alvaro Munoz and Alexander Mirosh of the HP Enterprise Security Team and reported to the Apache Tomcat Security Team on 5 July 2016. It was made public on 27 October 2016. Affects: 9.0.0.M1 to 9.0.0.M9 **Low: Timing Attack** [CVE-2016-0762](<https://vulners.com/cve/CVE-2016-0762>) The Realm implementations did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder. This was fixed in revision [1758499](<https://svn.apache.org/viewvc?view=rev&rev=1758499>). This issue was identified by the Apache Tomcat Security Team on 1 January 2016 and made public on 27 October 2016. Affects: 9.0.0.M1 to 9.0.0.M9


Affected Software


CPE Name Name Version
apache tomcat 9.0.0.M1
apache tomcat 9.0.0.M9

Related