Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-0763

Опубликовано: 22 фев. 2016
Источник: redhat
CVSS3: 6.3
CVSS2: 4.3

Описание

The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.

A security manager bypass flaw was found in Tomcat that could allow remote, authenticated users to access arbitrary application data, potentially resulting in a denial of service.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tomcat6Not affected
Red Hat JBoss BRMS 5jbosswebWill not fix
Red Hat JBoss Data Grid 6jbosswebAffected
Red Hat JBoss Enterprise Application Platform 4jbosswebWill not fix
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Application Platform 6jbosswebWill not fix
Red Hat JBoss Fuse Service Works 6jbosswebWill not fix
Red Hat JBoss Operations Network 3jbosswebAffected
Red Hat JBoss Portal 6jbosswebAffected
Red Hat Enterprise Linux 7tomcatFixedRHSA-2016:259903.11.2016

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-287
https://bugzilla.redhat.com/show_bug.cgi?id=1311093tomcat: security manager bypass via setGlobalContext()

6.3 Medium

CVSS3

4.3 Medium

CVSS2

Связанные уязвимости

CVSS3: 6.3
ubuntu
больше 9 лет назад

The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.

CVSS3: 6.3
nvd
больше 9 лет назад

The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.

CVSS3: 6.3
debian
больше 9 лет назад

The setGlobalContext method in org/apache/naming/factory/ResourceLinkF ...

CVSS3: 6.3
github
около 3 лет назад

Improper Verification of Source of a Communication Channel in Apache Tomcat

fstec
больше 9 лет назад

Уязвимость сервера приложений Apache Tomcat, позволяющая нарушителю вызвать отказ в обслуживании

6.3 Medium

CVSS3

4.3 Medium

CVSS2