TROYANOSYVIRUS
Zuruck zu CVEs

CVE-2016-8735

CRITICALCISA KEV
9.8

Beschreibung

Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.

CVE Details

CVSS v3.1 Bewertung9.8
SchweregradCRITICAL
CVSS VektorCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
AngriffsvektorNETWORK
KomplexitatLOW
Erforderliche PrivilegienNONE
BenutzerinteraktionNONE
Veroffentlicht4/6/2017
Zuletzt geandert4/21/2026
Quellekev
Honeypot-Sichtungen0

CISA KEV

HerstellerApache
ProduktTomcat
SchwachstellennameApache Tomcat Remote Code Execution Vulnerability
KEV Aufnahmedatum2023-05-12
Behebungsfrist2023-06-02
Ransomware-NutzungUnknown

Betroffene Produkte

apache:tomcatcanonical:ubuntu_linuxdebian:debian_linuxnetapp:7-mode_transition_toolnetapp:oncommand_insightnetapp:oncommand_shiftnetapp:snap_creator_frameworkoracle:agile_engineering_data_managementoracle:agile_plmoracle:communications_application_session_controlleroracle:communications_instant_messaging_serveroracle:communications_interactive_session_recorderoracle:hospitality_guest_accessoracle:micros_relate_crm_softwareoracle:micros_retail_xbri_loss_preventionoracle:mysql_enterprise_monitororacle:retail_convenience_and_fuel_pos_softwareoracle:transportation_managementredhat:jboss_enterprise_web_server

Referenzen

https://usn.ubuntu.com/4557-1/(security@apache.org)
http://rhn.redhat.com/errata/RHSA-2017-0457.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/oss-sec/2016/q4/502(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-6.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-7.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-8.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-9.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3738(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94463(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037331(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0455(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0456(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180607-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4557-1/(af854a3a-2127-422b-91ae-364da2661108)

IOC Korrelationen

Keine Korrelationen erfasst

This product uses data from the NVD API but is not endorsed or certified by the NVD.