CVE-2016-0706
25.02.2016, 01:59
Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.Enginsight
Vendor | Product | Version |
---|---|---|
canonical | ubuntu_linux | 12.04 |
canonical | ubuntu_linux | 14.04 |
canonical | ubuntu_linux | 15.10 |
canonical | ubuntu_linux | 16.04 |
debian | debian_linux | 7.0 |
debian | debian_linux | 8.0 |
apache | tomcat | 6.0.0 |
apache | tomcat | 6.0.0 |
apache | tomcat | 6.0.1 |
apache | tomcat | 6.0.1 |
apache | tomcat | 6.0.2 |
apache | tomcat | 6.0.2 |
apache | tomcat | 6.0.2 |
apache | tomcat | 6.0.4 |
apache | tomcat | 6.0.4 |
apache | tomcat | 6.0.10 |
apache | tomcat | 6.0.11 |
apache | tomcat | 6.0.13 |
apache | tomcat | 6.0.14 |
apache | tomcat | 6.0.16 |
apache | tomcat | 6.0.18 |
apache | tomcat | 6.0.20 |
apache | tomcat | 6.0.24 |
apache | tomcat | 6.0.26 |
apache | tomcat | 6.0.28 |
apache | tomcat | 6.0.29 |
apache | tomcat | 6.0.30 |
apache | tomcat | 6.0.32 |
apache | tomcat | 6.0.33 |
apache | tomcat | 6.0.35 |
apache | tomcat | 6.0.36 |
apache | tomcat | 6.0.37 |
apache | tomcat | 6.0.39 |
apache | tomcat | 6.0.41 |
apache | tomcat | 6.0.43 |
apache | tomcat | 6.0.44 |
apache | tomcat | 7.0.0 |
apache | tomcat | 7.0.2 |
apache | tomcat | 7.0.4 |
apache | tomcat | 7.0.5 |
apache | tomcat | 7.0.6 |
apache | tomcat | 7.0.10 |
apache | tomcat | 7.0.11 |
apache | tomcat | 7.0.12 |
apache | tomcat | 7.0.14 |
apache | tomcat | 7.0.16 |
apache | tomcat | 7.0.19 |
apache | tomcat | 7.0.20 |
apache | tomcat | 7.0.21 |
apache | tomcat | 7.0.22 |
apache | tomcat | 7.0.23 |
apache | tomcat | 7.0.25 |
apache | tomcat | 7.0.26 |
apache | tomcat | 7.0.27 |
apache | tomcat | 7.0.28 |
apache | tomcat | 7.0.29 |
apache | tomcat | 7.0.30 |
apache | tomcat | 7.0.32 |
apache | tomcat | 7.0.33 |
apache | tomcat | 7.0.34 |
apache | tomcat | 7.0.35 |
apache | tomcat | 7.0.37 |
apache | tomcat | 7.0.39 |
apache | tomcat | 7.0.40 |
apache | tomcat | 7.0.41 |
apache | tomcat | 7.0.42 |
apache | tomcat | 7.0.47 |
apache | tomcat | 7.0.50 |
apache | tomcat | 7.0.52 |
apache | tomcat | 7.0.53 |
apache | tomcat | 7.0.54 |
apache | tomcat | 7.0.55 |
apache | tomcat | 7.0.56 |
apache | tomcat | 7.0.57 |
apache | tomcat | 7.0.59 |
apache | tomcat | 7.0.61 |
apache | tomcat | 7.0.62 |
apache | tomcat | 7.0.63 |
apache | tomcat | 7.0.64 |
apache | tomcat | 7.0.65 |
apache | tomcat | 7.0.67 |
apache | tomcat | 8.0.0 |
apache | tomcat | 8.0.0 |
apache | tomcat | 8.0.0 |
apache | tomcat | 8.0.0 |
apache | tomcat | 8.0.1 |
apache | tomcat | 8.0.3 |
apache | tomcat | 8.0.11 |
apache | tomcat | 8.0.12 |
apache | tomcat | 8.0.14 |
apache | tomcat | 8.0.15 |
apache | tomcat | 8.0.17 |
apache | tomcat | 8.0.18 |
apache | tomcat | 8.0.20 |
apache | tomcat | 8.0.21 |
apache | tomcat | 8.0.22 |
apache | tomcat | 8.0.23 |
apache | tomcat | 8.0.24 |
apache | tomcat | 8.0.26 |
apache | tomcat | 8.0.27 |
apache | tomcat | 8.0.28 |
apache | tomcat | 8.0.29 |
apache | tomcat | 8.0.30 |
apache | tomcat | 9.0.0 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
tomcat6 |
| ||||||||||||||||
tomcat7 |
| ||||||||||||||||
tomcat8 |
|
Common Weakness Enumeration
References