#VU263 Security Manager bypass in Oracle products - CVE-2016-0706
Published: August 5, 2016 / Updated: January 11, 2017
Apache Tomcat
Oracle Solaris
Oracle Linux
Oracle Transportation Management
Virtual Desktop Infrastructure
Apache Foundation
Oracle
Description
The vulnerability allows a local attacker to obtain potentially sensitive information.
A local attacker, who controls web application, can use StatusManagerServlet, when a security manager was configured, to obtain potentially sensitive information, which belongs to other users. The attacker will be able to obtain a list of all deployed applications and a list of the HTTP request lines for all requests currently being processed. This could have exposed sensitive information from other web applications, such as session IDs, to the web application.
Successful exploitation of the vulnerability may allow a local attacker to gain access to potentially sensitive information.
Remediation
External links
- https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.45
- https://tomcat.apache.org/security-7.html
- https://tomcat.apache.org/security-8.html
- https://tomcat.apache.org/security-9.html
- http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.html
- http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html
- http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html