Access Restriction Bypass

Affecting org.apache.tomcat:tomcat-catalina artifact, versions [7.0.0,7.0.72) || [8,8.0.37) || [8.5.0,8.5.5) || [9-alpha,9.0.0.M10)

Do your applications use this vulnerable package? Test your applications

Overview

org.apache.tomcat:tomcat-catalina is a Tomcat Servlet Engine Core Classes and Standard implementations.

Affected versions of this package are vulnerable to Access Restriction Bypass. It was discovered that it was possible for a web application to access any global JNDI resource whether an explicit ResourceLink had been configured or not.

Remediation

Upgrade org.apache.tomcat:tomcat-catalina to version 7.0.72, 8.0.37, 8.5.5, 9.0.0.M10 or higher.

References

CVSS Score

7.5
high severity
  • Attack Vector
    Network
  • Attack Complexity
    Low
  • Privileges Required
    None
  • User Interaction
    None
  • Scope
    Unchanged
  • Confidentiality
    High
  • Integrity
    None
  • Availability
    None
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
Credit
the Apache Tomcat Security Team
CVE
CVE-2016-6797
CWE
CWE-284
Snyk ID
SNYK-JAVA-ORGAPACHETOMCAT-30918
Disclosed
28 Oct, 2016
Published
28 Oct, 2016