Apache Tomcat 访问控制错误漏洞

admin 2022-07-25 17:20:50 CNNVD漏洞 来源:ZONE.CI 全球网 0 阅读模式

漏洞信息详情

Apache Tomcat 访问控制错误漏洞

  • CNNVD编号:CNNVD-201611-609
  • 危害等级: 超危
  • CVE编号: CVE-2016-8735
  • 漏洞类型: 访问控制错误
  • 发布时间: 2016-11-08
  • 威胁类型: 远程
  • 更新时间: 2020-10-22
  • 厂        商: apache
  • 漏洞来源: Ubuntu

漏洞简介

Apache Tomcat是美国阿帕奇(Apache)软件基金会下属的Jakarta项目的一款轻量级Web应用服务器,它主要用于开发和调试jsP程序,适用于中小型系统。

Apache Tomcat中存在远程代码执行漏洞。远程攻击者可利用该漏洞执行代码。以下版本受到影响:Apache Tomcat 6.0.48之前的版本,7.0.73之前的7.x版本,8.0.39之前的8.x版本,8.5.7之前的8.5.x版本,9.0.0.M12之前的9.x版本。

漏洞公告

目前厂商已经发布了升级补丁以修复此安全问题,补丁获取链接:

http://tomcat.apache.org/security-6.HTML

http://tomcat.apache.org/security-7.HTML

http://tomcat.apache.org/security-8.HTML

http://tomcat.apache.org/security-9.HTML

参考网址

来源:CONFIRM

链接:http://seclists.org/oss-sec/2016/q4/502

来源:CONFIRM

链接:http://tomcat.apache.org/security-8.HTML

来源:MISC

链接:https://www.oracle.com/technetwork/security-advisory/cpujul2019-5072835.HTML

来源:CONFIRM

链接:http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.HTML

来源:CONFIRM

链接:http://svn.apache.org/viewvc?view=revision&revision=1767684

来源:MLIST

链接:https://lists.apache.org/thread.HTML/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.HTML/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://svn.apache.org/viewvc?view=revision&revision=1767644

来源:MLIST

链接:https://lists.apache.org/thread.HTML/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:https://security.netapp.com/advisory/ntap-20180607-0001/

来源:MLIST

链接:https://lists.apache.org/thread.HTML/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://tomcat.apache.org/security-9.HTML

来源:BID

链接:https://www.securityfocus.com/bid/94463

来源:REDHAT

链接:http://rhn.redhat.com/errata/RHSA-2017-0457.HTML

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2017:0455

来源:MLIST

链接:https://lists.apache.org/thread.HTML/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://tomcat.apache.org/security-6.HTML

来源:CONFIRM

链接:http://www.oracle.com/technetwork/security-advisory/cpujan2018-3236628.HTML

来源:MISC

链接:https://www.oracle.com/technetwork/security-advisory/cpuapr2019-5072813.HTML

来源:MLIST

链接:https://lists.apache.org/thread.HTML/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3E

来源:DEBIAN

链接:http://www.debian.org/security/2016/dsa-3738

来源:BID

链接:http://www.securityfocus.com/bid/94463

来源:REDHAT

链接:https://access.redhat.com/errata/RHSA-2017:0456

来源:DEBIAN

链接:https://www.debian.org/security/2016/dsa-3738

来源:MLIST

链接:https://lists.apache.org/thread.HTML/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://svn.apache.org/viewvc?view=revision&revision=1767676

来源:MLIST

链接:https://lists.apache.org/thread.HTML/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708@%3Cdev.tomcat.apache.org%3E

来源:UBUNTU

链接:https://usn.ubuntu.com/4557-1/

来源:CONFIRM

链接:http://svn.apache.org/viewvc?view=revision&revision=1767656

来源:MLIST

链接:https://lists.apache.org/thread.HTML/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://tomcat.apache.org/security-7.HTML

来源:MLIST

链接:https://lists.apache.org/thread.HTML/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3E

来源:CONFIRM

链接:http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.HTML

来源:MLIST

链接:https://lists.apache.org/thread.HTML/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.HTML/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.HTML/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3E

来源:MLIST

链接:https://lists.apache.org/thread.HTML/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3E

来源:SECTRACK

链接:http://www.securitytracker.com/id/1037331

来源:www.auscert.org.au

链接:https://www.auscert.org.au/bulletins/ESB-2020.3415/

来源:packetstormsecurity.com

链接:https://packetstormsecurity.com/files/159413/Ubuntu-Security-Notice-USN-4557-1.HTML

受影响实体

  • Apache Tomcat:9.0.0:M9  
  • Apache Tomcat:9.0.0:M8  
  • Apache Tomcat:9.0.0:M7  
  • Apache Tomcat:9.0.0:M6  
  • Apache Tomcat:9.0.0:M4  

补丁

  • Apache Tomcat 远程代码执行漏洞的修复措施

weinxin
特别声明
本站(ZONE.CI)所有文章仅供技术研究,若将其信息做其他用途,由用户承担全部法律及连带责任,本站不承担任何法律及连带责任,请遵守中华人民共和国安全法.
评论:0   参与:  0