Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2016-6816

Опубликовано: 22 нояб. 2016
Источник: redhat
CVSS3: 6.5
CVSS2: 5.8
EPSS Низкий

Описание

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.

Отчет

Applying the fix provided to mitigate this issue may cause Tomcat to return 400 status after updating. For more information, refer to https://access.redhat.com/solutions/2891171

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Developer Toolset 3.1devtoolset-3-tomcatNot affected
Red Hat Enterprise Linux 5tomcat5Will not fix
Red Hat JBoss Data Grid 6jbosswebWill not fix
Red Hat JBoss Data Virtualization 6jbosswebWill not fix
Red Hat JBoss Enterprise Application Platform 5jbosswebWill not fix
Red Hat JBoss Enterprise Web Server 2tomcat6Affected
Red Hat JBoss Enterprise Web Server 2tomcat7Affected
Red Hat JBoss Enterprise Web Server 3tomcat7Fix deferred
Red Hat JBoss Fuse 6jbosswebUnder investigation
Red Hat JBoss Operations Network 3Core ServerWill not fix

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-444
https://bugzilla.redhat.com/show_bug.cgi?id=1397484tomcat: HTTP Request smuggling vulnerability due to permitting invalid character in HTTP requests

EPSS

Процентиль: 87%
0.0326
Низкий

6.5 Medium

CVSS3

5.8 Medium

CVSS2

Связанные уязвимости

CVSS3: 7.1
ubuntu
около 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
nvd
около 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1 to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack and/or obtain sensitive information from requests other then their own.

CVSS3: 7.1
debian
около 8 лет назад

The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0 ...

CVSS3: 7.1
github
около 3 лет назад

Improper Input Validation in Apache Tomcat

oracle-oval
около 8 лет назад

ELSA-2017-0935: tomcat security update (MODERATE)

EPSS

Процентиль: 87%
0.0326
Низкий

6.5 Medium

CVSS3

5.8 Medium

CVSS2