Lucene search

K
cve[email protected]CVE-2016-0706
HistoryFeb 25, 2016 - 1:59 a.m.

CVE-2016-0706

2016-02-2501:59:04
CWE-200
web.nvd.nist.gov
100
cve-2016-0706
apache tomcat
security bypass
remote authentication
http requests
session id

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

6.3 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

68.2%

Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.

Affected configurations

NVD
Node
canonicalubuntu_linuxMatch12.04lts
OR
canonicalubuntu_linuxMatch14.04lts
OR
canonicalubuntu_linuxMatch15.10
OR
canonicalubuntu_linuxMatch16.04lts
Node
debiandebian_linuxMatch7.0
OR
debiandebian_linuxMatch8.0
Node
apachetomcatMatch6.0.0
OR
apachetomcatMatch6.0.0alpha
OR
apachetomcatMatch6.0.1
OR
apachetomcatMatch6.0.1alpha
OR
apachetomcatMatch6.0.2
OR
apachetomcatMatch6.0.2alpha
OR
apachetomcatMatch6.0.2beta
OR
apachetomcatMatch6.0.4
OR
apachetomcatMatch6.0.4alpha
OR
apachetomcatMatch6.0.10
OR
apachetomcatMatch6.0.11
OR
apachetomcatMatch6.0.13
OR
apachetomcatMatch6.0.14
OR
apachetomcatMatch6.0.16
OR
apachetomcatMatch6.0.18
OR
apachetomcatMatch6.0.20
OR
apachetomcatMatch6.0.24
OR
apachetomcatMatch6.0.26
OR
apachetomcatMatch6.0.28
OR
apachetomcatMatch6.0.29
OR
apachetomcatMatch6.0.30
OR
apachetomcatMatch6.0.32
OR
apachetomcatMatch6.0.33
OR
apachetomcatMatch6.0.35
OR
apachetomcatMatch6.0.36
OR
apachetomcatMatch6.0.37
OR
apachetomcatMatch6.0.39
OR
apachetomcatMatch6.0.41
OR
apachetomcatMatch6.0.43
OR
apachetomcatMatch6.0.44
OR
apachetomcatMatch7.0.0beta
OR
apachetomcatMatch7.0.2beta
OR
apachetomcatMatch7.0.4beta
OR
apachetomcatMatch7.0.5beta
OR
apachetomcatMatch7.0.6
OR
apachetomcatMatch7.0.10
OR
apachetomcatMatch7.0.11
OR
apachetomcatMatch7.0.12
OR
apachetomcatMatch7.0.14
OR
apachetomcatMatch7.0.16
OR
apachetomcatMatch7.0.19
OR
apachetomcatMatch7.0.20
OR
apachetomcatMatch7.0.21
OR
apachetomcatMatch7.0.22
OR
apachetomcatMatch7.0.23
OR
apachetomcatMatch7.0.25
OR
apachetomcatMatch7.0.26
OR
apachetomcatMatch7.0.27
OR
apachetomcatMatch7.0.28
OR
apachetomcatMatch7.0.29
OR
apachetomcatMatch7.0.30
OR
apachetomcatMatch7.0.32
OR
apachetomcatMatch7.0.33
OR
apachetomcatMatch7.0.34
OR
apachetomcatMatch7.0.35
OR
apachetomcatMatch7.0.37
OR
apachetomcatMatch7.0.39
OR
apachetomcatMatch7.0.40
OR
apachetomcatMatch7.0.41
OR
apachetomcatMatch7.0.42
OR
apachetomcatMatch7.0.47
OR
apachetomcatMatch7.0.50
OR
apachetomcatMatch7.0.52
OR
apachetomcatMatch7.0.53
OR
apachetomcatMatch7.0.54
OR
apachetomcatMatch7.0.55
OR
apachetomcatMatch7.0.56
OR
apachetomcatMatch7.0.57
OR
apachetomcatMatch7.0.59
OR
apachetomcatMatch7.0.61
OR
apachetomcatMatch7.0.62
OR
apachetomcatMatch7.0.63
OR
apachetomcatMatch7.0.64
OR
apachetomcatMatch7.0.65
OR
apachetomcatMatch7.0.67
OR
apachetomcatMatch8.0.0rc1
OR
apachetomcatMatch8.0.0rc10
OR
apachetomcatMatch8.0.0rc3
OR
apachetomcatMatch8.0.0rc5
OR
apachetomcatMatch8.0.1
OR
apachetomcatMatch8.0.3
OR
apachetomcatMatch8.0.11
OR
apachetomcatMatch8.0.12
OR
apachetomcatMatch8.0.14
OR
apachetomcatMatch8.0.15
OR
apachetomcatMatch8.0.17
OR
apachetomcatMatch8.0.18
OR
apachetomcatMatch8.0.20
OR
apachetomcatMatch8.0.21
OR
apachetomcatMatch8.0.22
OR
apachetomcatMatch8.0.23
OR
apachetomcatMatch8.0.24
OR
apachetomcatMatch8.0.26
OR
apachetomcatMatch8.0.27
OR
apachetomcatMatch8.0.28
OR
apachetomcatMatch8.0.29
OR
apachetomcatMatch8.0.30
OR
apachetomcatMatch9.0.0milestone1

References

4 Medium

CVSS2

Attack Vector

NETWORK

Attack Complexity

LOW

Authentication

SINGLE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:S/C:P/I:N/A:N

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

LOW

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

6.3 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

68.2%