Free and open-source vulnerability scanner
Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.
Install NowAvailable for macOS, Windows, and Linux

CVE-2016-0706
CVE information
Published
Last Modified
CVSSv2.0 Severity
CVSSv3.1 Severity
Impact Analysis
Description
Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application..
CVSSv2.0 Score
- Severity
- Medium
- Base Score
- 4/10
- Exploit Score
- 8/10
- Access Vector
- Network
- Access Complexity
- Low
- Authentication Required
- Single
- Impact Score
- 2.9/10
- Confidentiality Impact
- Partial
- Availability Impact
- None
- Integrity Impact
- None
CVSSv3.1 Score
- Severity
- Medium
- Base Score
- 4.3/10
- Exploit Score
- 2.8/10
- Access Vector
- Network
- Access Complexity
- Low
- Privileges Required
- Low
- Impact Score
- 1.4/10
- Confidentiality Impact
- Low
- Availability Impact
- None
- Integrity Impact
- None
- Scope
- Unchanged
- User Interaction
- None
Products Affected
CPE | Affected | Vulnerable | Excluding | Edit |
---|---|---|---|---|
cpe:2.3:o:canonical:ubuntu_linux:12.04:*:*:*:lts:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:15.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:canonical:ubuntu_linux:14.04:*:*:*:lts:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:o:debian:debian_linux:7.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.2:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.33:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.0:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.30:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.39:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.62:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.17:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.53:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.4:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.34:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.26:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.55:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.4:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.63:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.39:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.26:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:9.0.0:m1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.28:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.0:rc3:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.59:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.65:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.44:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.50:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.6:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.20:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.12:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.27:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.15:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.29:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.67:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.0:rc1:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.0:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.1:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.24:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.22:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.29:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.37:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.52:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.42:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.32:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.28:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.37:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.29:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.11:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.24:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.0:rc10:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.23:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.47:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.5:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.41:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.30:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.19:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.41:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.10:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.18:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.25:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.54:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.35:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.61:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.3:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.18:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.57:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.2:alpha:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.14:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.0:rc5:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.32:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.43:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.21:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.27:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.40:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.30:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.2:beta:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.56:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.26:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:8.0.28:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.64:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.35:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.16:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:6.0.36:*:*:*:*:*:*:* |
Yes
|
- | - | |
cpe:2.3:a:apache:tomcat:7.0.33:*:*:*:*:*:*:* |
Yes
|
- | - |
References
- http://svn.apache.org/viewvc?view=revision&revision=1722800
- http://tomcat.apache.org/security-6.html
- http://tomcat.apache.org/security-8.html
- http://tomcat.apache.org/security-9.html
- http://svn.apache.org/viewvc?view=revision&revision=1722801
- http://tomcat.apache.org/security-7.html
- http://seclists.org/bugtraq/2016/Feb/144
- http://svn.apache.org/viewvc?view=revision&revision=1722799
- http://svn.apache.org/viewvc?view=revision&revision=1722802
- http://www.debian.org/security/2016/dsa-3530
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
- http://www.debian.org/security/2016/dsa-3609
- http://www.ubuntu.com/usn/USN-3024-1
- http://www.debian.org/security/2016/dsa-3552
- https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
- http://marc.info/?l=bugtraq&m=145974991225029&w=2
- http://rhn.redhat.com/errata/RHSA-2016-2045.html
- http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
- http://www.securityfocus.com/bid/83324
- https://access.redhat.com/errata/RHSA-2016:1087
- http://rhn.redhat.com/errata/RHSA-2016-1089.html
- https://access.redhat.com/errata/RHSA-2016:1088
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html
- https://bto.bluecoat.com/security-advisory/sa118
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html
- http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html
- http://www.securitytracker.com/id/1035069
- https://security.gentoo.org/glsa/201705-09
- http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html
- http://rhn.redhat.com/errata/RHSA-2016-2808.html
- http://rhn.redhat.com/errata/RHSA-2016-2807.html
- http://rhn.redhat.com/errata/RHSA-2016-2599.html
- https://security.netapp.com/advisory/ntap-20180531-0001/
- http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
- https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab30336
- https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dc
- https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f13
- https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5ce
- https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe
- https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae
- https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cb