CVE-2016-6796
11.08.2017, 02:29
A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.Enginsight
Vendor | Product | Version |
---|---|---|
apache | tomcat | 6.0.0 ≤ 𝑥 ≤ 6.0.45 |
apache | tomcat | 7.0.0 ≤ 𝑥 ≤ 7.0.70 |
apache | tomcat | 8.0 ≤ 𝑥 ≤ 8.0.36 |
apache | tomcat | 8.5.0 ≤ 𝑥 ≤ 8.5.4 |
apache | tomcat | 9.0.0:milestone1 |
apache | tomcat | 9.0.0:milestone2 |
apache | tomcat | 9.0.0:milestone3 |
apache | tomcat | 9.0.0:milestone4 |
apache | tomcat | 9.0.0:milestone5 |
apache | tomcat | 9.0.0:milestone6 |
apache | tomcat | 9.0.0:milestone7 |
apache | tomcat | 9.0.0:milestone8 |
apache | tomcat | 9.0.0:milestone9 |
debian | debian_linux | 8.0 |
netapp | oncommand_insight | - |
netapp | oncommand_shift | - |
netapp | snap_creator_framework | - |
canonical | ubuntu_linux | 16.04 |
oracle | tekelec_platform_distribution | 7.4.0 |
oracle | tekelec_platform_distribution | 7.7.1 |
redhat | jboss_enterprise_application_platform | 6.4 |
redhat | jboss_enterprise_web_server | 3.0.0 |
redhat | enterprise_linux_desktop | 7.0 |
redhat | enterprise_linux_eus | 7.4 |
redhat | enterprise_linux_eus | 7.5 |
redhat | enterprise_linux_eus | 7.6 |
redhat | enterprise_linux_eus | 7.7 |
redhat | enterprise_linux_server | 7.0 |
redhat | enterprise_linux_server_aus | 7.4 |
redhat | enterprise_linux_server_aus | 7.6 |
redhat | enterprise_linux_server_aus | 7.7 |
redhat | enterprise_linux_server_tus | 7.6 |
redhat | enterprise_linux_server_tus | 7.7 |
redhat | enterprise_linux_workstation | 7.0 |
𝑥
= Vulnerable software versions

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
tomcat6 |
| ||||||||||||||||||||||||||||||||||||||
tomcat7 |
| ||||||||||||||||||||||||||||||||||||||
tomcat8 |
|
References