CVE-2016-0706

4.3 MEDIUM
Published: February 25, 2016 Modified: May 06, 2026
View on NVD

Description

Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

CVSS v3.x Details

0.0 Low Medium High Critical 10.0
Vector String
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:N/A:N

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://marc.info/?l=bugtraq&m=145974991225029&w=2
Source: secalert@redhat.com
Third Party Advisory
http://seclists.org/bugtraq/2016/Feb/144
Source: secalert@redhat.com
Mailing List
http://svn.apache.org/viewvc?view=revision&revision=1722799
Source: secalert@redhat.com
Issue Tracking
http://svn.apache.org/viewvc?view=revision&revision=1722801
Source: secalert@redhat.com
Issue Tracking
http://svn.apache.org/viewvc?view=revision&revision=1722802
Source: secalert@redhat.com
Issue Tracking
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
Vendor Advisory
http://tomcat.apache.org/security-7.html
Source: secalert@redhat.com
Vendor Advisory
http://tomcat.apache.org/security-8.html
Source: secalert@redhat.com
Vendor Advisory
http://tomcat.apache.org/security-9.html
Source: secalert@redhat.com
Vendor Advisory
http://www.debian.org/security/2016/dsa-3530
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3552
Source: secalert@redhat.com
Third Party Advisory
http://www.debian.org/security/2016/dsa-3609
Source: secalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/bid/83324
Source: secalert@redhat.com
http://www.ubuntu.com/usn/USN-3024-1
Source: secalert@redhat.com
Third Party Advisory
http://marc.info/?l=bugtraq&m=145974991225029&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://rhn.redhat.com/errata/RHSA-2016-1089.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2016-2045.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2016-2599.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2016-2807.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://rhn.redhat.com/errata/RHSA-2016-2808.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://seclists.org/bugtraq/2016/Feb/144
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List
http://svn.apache.org/viewvc?view=revision&revision=1722799
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
http://svn.apache.org/viewvc?view=revision&revision=1722800
Source: af854a3a-2127-422b-91ae-364da2661108
http://svn.apache.org/viewvc?view=revision&revision=1722801
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
http://svn.apache.org/viewvc?view=revision&revision=1722802
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tomcat.apache.org/security-7.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tomcat.apache.org/security-8.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tomcat.apache.org/security-9.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www.debian.org/security/2016/dsa-3530
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://www.debian.org/security/2016/dsa-3552
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.debian.org/security/2016/dsa-3609
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/bid/83324
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securitytracker.com/id/1035069
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.ubuntu.com/usn/USN-3024-1
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://access.redhat.com/errata/RHSA-2016:1087
Source: af854a3a-2127-422b-91ae-364da2661108
https://access.redhat.com/errata/RHSA-2016:1088
Source: af854a3a-2127-422b-91ae-364da2661108
https://bto.bluecoat.com/security-advisory/sa118
Source: af854a3a-2127-422b-91ae-364da2661108
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://security.gentoo.org/glsa/201705-09
Source: af854a3a-2127-422b-91ae-364da2661108
https://security.netapp.com/advisory/ntap-20180531-0001/
Source: af854a3a-2127-422b-91ae-364da2661108

90 reference(s) from NVD

Quick Stats

CVSS v3 Score
4.3 / 10.0
EPSS (Exploit Probability)
1.5%
81th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache canonical debian