CVE-2016-5018
high-risk
Published 2017-08-10
In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
Do I need to act?
-
0.94% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
9
CVSS 9.1/10
Critical
NETWORK
/ LOW complexity
Affected Products (20)
References (60)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0457.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-1551.html
Third Party Advisory
http://www.debian.org/security/2016/dsa-3720
Broken Link
http://www.securityfocus.com/bid/93942
Broken Link
http://www.securitytracker.com/id/1037142
Broken Link
http://www.securitytracker.com/id/1038757
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0455
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0456
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1548
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1549
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1550
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1552
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2247
and 40 more references
56
/ 100
high-risk
Severity
31/34 · Critical
Exploitability
3/34 · Minimal
Exposure
22/34 · High