First published: Thu Oct 27 2016(Updated: )
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
Credit: security@apache.org security@apache.org security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
debian/tomcat6 | ||
redhat/tomcat | <6.0.47 | 6.0.47 |
redhat/tomcat | <7.0.72 | 7.0.72 |
redhat/tomcat | <8.5.5 | 8.5.5 |
redhat/tomcat | <8.0.37 | 8.0.37 |
maven/org.apache.tomcat:tomcat | >=6.0.0<=6.0.45 | 6.0.46 |
maven/org.apache.tomcat:tomcat | >=7.0.0<=7.0.70 | 7.0.71 |
maven/org.apache.tomcat:tomcat | >=8.0.0.RC1<=8.0.36 | 8.0.37 |
maven/org.apache.tomcat:tomcat | >=8.5.0<=8.5.4 | 8.5.5 |
maven/org.apache.tomcat:tomcat | >=9.0.0.M1<=9.0.0.M9 | 9.0.0.M10 |
Apache Tomcat | >=6.0.0<=6.0.45 | |
Apache Tomcat | >=7.0.0<=7.0.70 | |
Apache Tomcat | >=8.0<=8.0.36 | |
Apache Tomcat | >=8.5.0<=8.5.4 | |
Apache Tomcat | =9.0.0-milestone1 | |
Apache Tomcat | =9.0.0-milestone2 | |
Apache Tomcat | =9.0.0-milestone3 | |
Apache Tomcat | =9.0.0-milestone4 | |
Apache Tomcat | =9.0.0-milestone5 | |
Apache Tomcat | =9.0.0-milestone6 | |
Apache Tomcat | =9.0.0-milestone7 | |
Apache Tomcat | =9.0.0-milestone8 | |
Apache Tomcat | =9.0.0-milestone9 | |
Debian | =8.0 | |
NetApp OnCommand Insight | ||
NetApp OnCommand Shift | ||
NetApp Snap Creator Framework | ||
Ubuntu | =16.04 | |
Oracle Tekelec Platform Distribution | =7.4.0 | |
Oracle Tekelec Platform Distribution | =7.7.1 | |
redhat jboss enterprise application platform | =6.4 | |
Red Hat JBoss Enterprise Web Server | =3.0.0 | |
redhat enterprise Linux desktop | =7.0 | |
redhat enterprise Linux eus | =7.4 | |
redhat enterprise Linux eus | =7.5 | |
redhat enterprise Linux eus | =7.6 | |
redhat enterprise Linux eus | =7.7 | |
redhat enterprise Linux server | =7.0 | |
redhat enterprise Linux server aus | =7.4 | |
redhat enterprise Linux server aus | =7.6 | |
redhat enterprise Linux server aus | =7.7 | |
redhat enterprise Linux server tus | =7.6 | |
redhat enterprise Linux server tus | =7.7 | |
redhat enterprise Linux workstation | =7.0 | |
Apache Tomcat | =9.0.0-m1 | |
Apache Tomcat | =9.0.0-m2 | |
Apache Tomcat | =9.0.0-m3 | |
Apache Tomcat | =9.0.0-m4 | |
Apache Tomcat | =9.0.0-m5 | |
Apache Tomcat | =9.0.0-m6 | |
Apache Tomcat | =9.0.0-m7 | |
Apache Tomcat | =9.0.0-m8 | |
Apache Tomcat | =9.0.0-m9 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-6796 has been classified as a high severity vulnerability due to its ability to bypass security restrictions.
To fix CVE-2016-6796, upgrade to Apache Tomcat version 6.0.47, 7.0.72, 8.0.37, 8.5.5, or 9.0.0.M10.
CVE-2016-6796 affects Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, and 6.0.0 to 6.0.45.
Yes, CVE-2016-6796 specifically allows a malicious web application to bypass the configured SecurityManager through manipulation of JSP Servlet configuration parameters.
The impact of CVE-2016-6796 could lead to unauthorized access or modification of application data if exploited successfully.