TROYANOSYVIRUS
Retour aux CVEs

CVE-2016-8735

CRITICALCISA KEV
9.8

Description

Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.

Details CVE

Score CVSS v3.19.8
SeveriteCRITICAL
Vecteur CVSSCVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:H/A:H
Vecteur d'attaqueNETWORK
ComplexiteLOW
Privileges requisNONE
Interaction utilisateurNONE
Publie4/6/2017
Derniere modification4/21/2026
Sourcekev
Observations honeypot0

CISA KEV

FournisseurApache
ProduitTomcat
Nom vulnerabiliteApache Tomcat Remote Code Execution Vulnerability
Date ajout KEV2023-05-12
Date limite remediation2023-06-02
Utilise dans ransomwareUnknown

Produits affectes

apache:tomcatcanonical:ubuntu_linuxdebian:debian_linuxnetapp:7-mode_transition_toolnetapp:oncommand_insightnetapp:oncommand_shiftnetapp:snap_creator_frameworkoracle:agile_engineering_data_managementoracle:agile_plmoracle:communications_application_session_controlleroracle:communications_instant_messaging_serveroracle:communications_interactive_session_recorderoracle:hospitality_guest_accessoracle:micros_relate_crm_softwareoracle:micros_retail_xbri_loss_preventionoracle:mysql_enterprise_monitororacle:retail_convenience_and_fuel_pos_softwareoracle:transportation_managementredhat:jboss_enterprise_web_server

References

https://usn.ubuntu.com/4557-1/(security@apache.org)
http://rhn.redhat.com/errata/RHSA-2017-0457.html(af854a3a-2127-422b-91ae-364da2661108)
http://seclists.org/oss-sec/2016/q4/502(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-6.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-7.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-8.html(af854a3a-2127-422b-91ae-364da2661108)
http://tomcat.apache.org/security-9.html(af854a3a-2127-422b-91ae-364da2661108)
http://www.debian.org/security/2016/dsa-3738(af854a3a-2127-422b-91ae-364da2661108)
http://www.securityfocus.com/bid/94463(af854a3a-2127-422b-91ae-364da2661108)
http://www.securitytracker.com/id/1037331(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0455(af854a3a-2127-422b-91ae-364da2661108)
https://access.redhat.com/errata/RHSA-2017:0456(af854a3a-2127-422b-91ae-364da2661108)
https://security.netapp.com/advisory/ntap-20180607-0001/(af854a3a-2127-422b-91ae-364da2661108)
https://usn.ubuntu.com/4557-1/(af854a3a-2127-422b-91ae-364da2661108)

Correlations IOC

Aucune correlation enregistree

This product uses data from the NVD API but is not endorsed or certified by the NVD.