We found results for “”
CVE-2016-6794
Good to know:
Date: August 10, 2017
When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
Language: Java
Severity Score
Related Resources (30)
Severity Score
Weakness Type (CWE)
Information Leak / Disclosure
CWE-200Insufficient Information
NVD-CWE-noinfoTop Fix
Upgrade Version
Upgrade to version org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-util-scan:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-catalina:9.0.0.M10,8.5.5,8.0.37,7.0.72,org.apache.tomcat:tomcat-coyote:9.0.0.M10,8.5.5,8.0.37,7.0.72
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |