Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2016-6816

Опубликовано: 20 мар. 2017
Источник: debian
EPSS Низкий

Описание

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat9not-affectedpackage
tomcat8fixed8.0.39-1package
tomcat7fixed7.0.72-3package
tomcat6fixed6.0.41-3package

Примечания

  • Since 7.0.72-3, src:tomcat7 only builds the Servlet API

  • Since 6.0.41-3, src:tomcat6 only builds a servlet and docs in Jessie

  • Fixed by: http://svn.apache.org/r1767653 (8.0.x)

  • Fixed by: http://svn.apache.org/r1767675 (7.0.x)

  • Fixed by: http://svn.apache.org/r1767683 (6.0.x)

EPSS

Процентиль: 87%
0.0326
Низкий

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 6.5
redhat
больше 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
nvd
около 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
github
около 3 лет назад

Improper Input Validation in Apache Tomcat

oracle-oval
около 8 лет назад

ELSA-2017-0935: tomcat security update (MODERATE)

EPSS

Процентиль: 87%
0.0326
Низкий