Lucene search

K
f5F5F5:K18174924
HistoryMar 05, 2018 - 12:00 a.m.

K18174924 : Apache Tomcat 6.x vulnerability CVE-2016-0706

2018-03-0500:00:00
my.f5.com
27

6.4 Medium

AI Score

Confidence

Low

0.003 Low

EPSS

Percentile

68.2%

Security Advisory Description

Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application. (CVE-2016-0706)

Impact

When this vulnerability is exploited via crafted web application, a remote authenticated user may bypass the intended security manager restrictions, read arbitrary HTTP requests, and discover session ID values.

  • BIG-IP/Enterprise Manager

BIG-IP and Enterprise Manager systems do not use the affected feature. The vulnerable software is present; however, the software is not used in a way that exposes this vulnerability. BIG-IP and Enterprise Manager systems are only vulnerable if you manually enable the feature by setting the SECURITY_MANAGER directive totrue in the**/etc/tomcat/tomcat.conf** file.

  • Traffix SDC

Exploitation of this vulnerability may occur if an attacker has access to the local network of the system; the Tomcat service is accessible only from the internal network.