漏洞信息详情
Apache Tomcat 访问控制错误漏洞
- CNNVD编号:CNNVD-201611-609
- 危害等级: 超危
- CVE编号: CVE-2016-8735
- 漏洞类型: 访问控制错误
- 发布时间: 2016-11-08
- 威胁类型: 远程
- 更新时间: 2020-10-22
- 厂 商: apache
- 漏洞来源: Ubuntu
漏洞简介
Apache Tomcat是美国阿帕奇(Apache)软件基金会下属的Jakarta项目的一款轻量级Web应用服务器,它主要用于开发和调试jsP程序,适用于中小型系统。
Apache Tomcat中存在远程代码执行漏洞。远程攻击者可利用该漏洞执行代码。以下版本受到影响:Apache Tomcat 6.0.48之前的版本,7.0.73之前的7.x版本,8.0.39之前的8.x版本,8.5.7之前的8.5.x版本,9.0.0.M12之前的9.x版本。
漏洞公告
目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:
http://tomcat.apache.org/security-6.HTML
http://tomcat.apache.org/security-7.HTML
http://tomcat.apache.org/security-8.HTML
http://tomcat.apache.org/security-9.HTML
参考网址
来源:CONFIRM
链接:http://seclists.org/oss-sec/2016/q4/502
来源:CONFIRM
链接:http://tomcat.apache.org/security-8.HTML
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.HTML
来源:CONFIRM
链接:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.HTML
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1767684
来源:MLIST
链接:https://lists.apache.org/thread.HTML/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.HTML/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1767644
来源:MLIST
链接:https://lists.apache.org/thread.HTML/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:https://security.netapp.com/advisory/ntap-20180607-0001/
来源:MLIST
链接:https://lists.apache.org/thread.HTML/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:http://tomcat.apache.org/security-9.HTML
来源:BID
链接:https://www.securityfocus.com/bid/94463
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2017-0457.HTML
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2017:0455
来源:MLIST
链接:https://lists.apache.org/thread.HTML/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:http://tomcat.apache.org/security-6.HTML
来源:CONFIRM
链接:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.HTML
来源:MISC
链接:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.HTML
来源:MLIST
链接:https://lists.apache.org/thread.HTML/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E
来源:DEBIAN
链接:http://www.debian.org/security/2016/dsa-3738
来源:BID
链接:http://www.securityfocus.com/bid/94463
来源:REDHAT
链接:https://access.redhat.com/errata/RHSA-2017:0456
来源:DEBIAN
链接:https://www.debian.org/security/2016/dsa-3738
来源:MLIST
链接:https://lists.apache.org/thread.HTML/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1767676
来源:MLIST
链接:https://lists.apache.org/thread.HTML/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E
来源:UBUNTU
链接:https://usn.ubuntu.com/4557-1/
来源:CONFIRM
链接:http://svn.apache.org/viewvc?view=revision&revision=1767656
来源:MLIST
链接:https://lists.apache.org/thread.HTML/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:http://tomcat.apache.org/security-7.HTML
来源:MLIST
链接:https://lists.apache.org/thread.HTML/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E
来源:CONFIRM
链接:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.HTML
来源:MLIST
链接:https://lists.apache.org/thread.HTML/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.HTML/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.HTML/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.HTML/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E
来源:SECTRACK
链接:http://www.securitytracker.com/id/1037331
来源:www.auscert.org.au
链接:https://www.auscert.org.au/bulletins/ESB-2020.3415/
来源:packetstormsecurity.com
链接:https://packetstormsecurity.com/files/159413/Ubuntu-Security-Notice-USN-4557-1.HTML
受影响实体
- Apache Tomcat:9.0.0:M9
- Apache Tomcat:9.0.0:M8
- Apache Tomcat:9.0.0:M7
- Apache Tomcat:9.0.0:M6
- Apache Tomcat:9.0.0:M4
补丁
- Apache Tomcat 远程代码执行漏洞的修复措施
评论