mirror of
https://github.com/CVEProject/cvelist.git
synced 2025-07-29 05:56:59 +00:00
115 lines
4.3 KiB
JSON
115 lines
4.3 KiB
JSON
{
|
|
"CVE_data_meta": {
|
|
"ASSIGNER": "security@apache.org",
|
|
"DATE_PUBLIC": "2016-10-27T00:00:00",
|
|
"ID": "CVE-2016-6797",
|
|
"STATE": "PUBLIC"
|
|
},
|
|
"affects": {
|
|
"vendor": {
|
|
"vendor_data": [
|
|
{
|
|
"product": {
|
|
"product_data": [
|
|
{
|
|
"product_name": "Apache Tomcat",
|
|
"version": {
|
|
"version_data": [
|
|
{
|
|
"version_value": "9.0.0.M1 to 9.0.0.M9"
|
|
},
|
|
{
|
|
"version_value": "8.5.0 to 8.5.4"
|
|
},
|
|
{
|
|
"version_value": "8.0.0.RC1 to 8.0.36"
|
|
},
|
|
{
|
|
"version_value": "7.0.0 to 7.0.70"
|
|
},
|
|
{
|
|
"version_value": "6.0.0 to 6.0.45"
|
|
}
|
|
]
|
|
}
|
|
}
|
|
]
|
|
},
|
|
"vendor_name": "Apache Software Foundation"
|
|
}
|
|
]
|
|
}
|
|
},
|
|
"data_format": "MITRE",
|
|
"data_type": "CVE",
|
|
"data_version": "4.0",
|
|
"description": {
|
|
"description_data": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "The ResourceLinkFactory implementation in Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not limit web application access to global JNDI resources to those resources explicitly linked to the web application. Therefore, it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not."
|
|
}
|
|
]
|
|
},
|
|
"problemtype": {
|
|
"problemtype_data": [
|
|
{
|
|
"description": [
|
|
{
|
|
"lang": "eng",
|
|
"value": "Information Disclosure"
|
|
}
|
|
]
|
|
}
|
|
]
|
|
},
|
|
"references": {
|
|
"reference_data": [
|
|
{
|
|
"name": "93940",
|
|
"refsource": "BID",
|
|
"url": "http://www.securityfocus.com/bid/93940"
|
|
},
|
|
{
|
|
"name": "https://security.netapp.com/advisory/ntap-20180605-0001/",
|
|
"refsource": "CONFIRM",
|
|
"url": "https://security.netapp.com/advisory/ntap-20180605-0001/"
|
|
},
|
|
{
|
|
"name": "[announce] 20161027 [SECURITY] CVE-2016-6797 Apache Tomcat Unrestricted Access to Global Resources",
|
|
"refsource": "MLIST",
|
|
"url": "https://lists.apache.org/thread.html/9325837eb00cba5752c092047433c7f0415134d16e7f391447ff4352@%3Cannounce.tomcat.apache.org%3E"
|
|
},
|
|
{
|
|
"name": "1037145",
|
|
"refsource": "SECTRACK",
|
|
"url": "http://www.securitytracker.com/id/1037145"
|
|
},
|
|
{
|
|
"name": "RHSA-2017:2247",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2017:2247"
|
|
},
|
|
{
|
|
"name": "RHSA-2017:0457",
|
|
"refsource": "REDHAT",
|
|
"url": "http://rhn.redhat.com/errata/RHSA-2017-0457.html"
|
|
},
|
|
{
|
|
"name": "RHSA-2017:0455",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2017:0455"
|
|
},
|
|
{
|
|
"name": "DSA-3720",
|
|
"refsource": "DEBIAN",
|
|
"url": "http://www.debian.org/security/2016/dsa-3720"
|
|
},
|
|
{
|
|
"name": "RHSA-2017:0456",
|
|
"refsource": "REDHAT",
|
|
"url": "https://access.redhat.com/errata/RHSA-2017:0456"
|
|
}
|
|
]
|
|
}
|
|
} |