First published: Tue Nov 01 2016(Updated: )
In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8. ...
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat | <6.0.47 | 6.0.47 |
redhat/tomcat | <7.0.72 | 7.0.72 |
redhat/tomcat | <8.5.5 | 8.5.5 |
redhat/tomcat | <8.0.37 | 8.0.37 |
maven/org.apache.tomcat.embed:tomcat-embed-jasper | >=6.0.0<=6.0.45 | 6.0.47 |
maven/org.apache.tomcat.embed:tomcat-embed-jasper | >=7.0.0<=7.0.70 | 7.0.72 |
maven/org.apache.tomcat.embed:tomcat-embed-jasper | >=8.0.0RC1<=8.0.36 | 8.0.37 |
maven/org.apache.tomcat.embed:tomcat-embed-jasper | >=8.5.0<=8.5.4 | 8.5.5 |
maven/org.apache.tomcat.embed:tomcat-embed-jasper | >=9.0.0.M1<=9.0.0.M9 | 9.0.0.M10 |
maven/org.apache.tomcat:jasper | >=6.0.0<=6.0.45 | 6.0.47 |
maven/org.apache.tomcat:tomcat-jasper | >=7.0.0<=7.0.70 | 7.0.72 |
maven/org.apache.tomcat:tomcat-jasper | >=8.0.0RC1<=8.0.36 | 8.0.37 |
maven/org.apache.tomcat:tomcat-jasper | >=8.5.0<=8.5.4 | 8.5.5 |
maven/org.apache.tomcat:tomcat-jasper | >=9.0.0.M1<=9.0.0.M9 | 9.0.0.M10 |
debian/tomcat6 | ||
Tomcat | >=6.0.0<=6.0.45 | |
Tomcat | >=7.0.0<=7.0.70 | |
Tomcat | >=8.0<=8.0.36 | |
Tomcat | >=8.5.0<=8.5.4 | |
Tomcat | =9.0.0-milestone1 | |
Tomcat | =9.0.0-milestone2 | |
Tomcat | =9.0.0-milestone3 | |
Tomcat | =9.0.0-milestone4 | |
Tomcat | =9.0.0-milestone5 | |
Tomcat | =9.0.0-milestone6 | |
Tomcat | =9.0.0-milestone7 | |
Tomcat | =9.0.0-milestone8 | |
Tomcat | =9.0.0-milestone9 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Shift | ||
NetApp Snap Creator Framework | ||
Ubuntu | =16.04 | |
Debian Linux | =8.0 | |
JBoss Enterprise Application Platform | =6.4 | |
Red Hat JBoss Enterprise Web Server | =3.0.0 | |
Red Hat Enterprise Linux Desktop | =7.0 | |
Red Hat Enterprise Linux Server EUS | =7.4 | |
Red Hat Enterprise Linux Server EUS | =7.5 | |
Red Hat Enterprise Linux Server EUS | =7.6 | |
Red Hat Enterprise Linux Server EUS | =7.7 | |
Red Hat Enterprise Linux Server | =7.0 | |
Red Hat Enterprise Linux Server | =7.4 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Server | =7.6 | |
Red Hat Enterprise Linux Server | =7.7 | |
Red Hat Enterprise Linux Workstation | =7.0 | |
Oracle Tekelec Platform Distribution | >=7.4.0<=7.7.1 | |
Tomcat | =9.0.0-m1 | |
Tomcat | =9.0.0-m2 | |
Tomcat | =9.0.0-m3 | |
Tomcat | =9.0.0-m4 | |
Tomcat | =9.0.0-m5 | |
Tomcat | =9.0.0-m6 | |
Tomcat | =9.0.0-m7 | |
Tomcat | =9.0.0-m8 | |
Tomcat | =9.0.0-m9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-5018 is classified as a moderate severity vulnerability affecting various versions of Apache Tomcat.
To fix CVE-2016-5018, update Apache Tomcat to one of the fixed versions, such as 6.0.47, 7.0.72, 8.0.37, 8.5.5, or 9.0.0.M10.
CVE-2016-5018 affects Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, and 6.0.0 to 6.0.45.
CVE-2016-5018 is a security vulnerability that allows a malicious web application to bypass a configured SecurityManager in Apache Tomcat.
Organizations and individuals using vulnerable versions of Apache Tomcat should be concerned about CVE-2016-5018 due to its potential security implications.