CVE-2016-6796
high-risk
Published 2017-08-11
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
Do I need to act?
-
0.84% chance of exploitation
EPSS score — low exploit probability
-
Not on CISA KEV list
No confirmed active exploitation reported to CISA
?
Patch status unknown
Check vendor advisories for fix availability and mitigation guidance
7
CVSS 7.5/10
High
NETWORK
/ LOW complexity
Affected Products (20)
References (62)
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-0457.html
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2017-1551.html
Third Party Advisory
http://www.debian.org/security/2016/dsa-3720
Broken Link
http://www.securityfocus.com/bid/93944
Broken Link
http://www.securitytracker.com/id/1037141
Broken Link
http://www.securitytracker.com/id/1038757
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0455
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:0456
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1548
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1549
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1550
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:1552
Third Party Advisory
https://access.redhat.com/errata/RHSA-2017:2247
and 42 more references
52
/ 100
high-risk
Severity
26/34 · High
Exploitability
3/34 · Minimal
Exposure
23/34 · High