Vulnerability Details CVE-2016-0706
Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 does not place org.apache.catalina.manager.StatusManagerServlet on the org/apache/catalina/core/RestrictedServlets.properties list, which allows remote authenticated users to bypass intended SecurityManager restrictions and read arbitrary HTTP requests, and consequently discover session ID values, via a crafted web application.
Exploit prediction scoring system (EPSS) score
EPSS Score 0.003
EPSS Ranking 54.5%
CVSS Severity
CVSS v3 Score 4.3
CVSS v2 Score 4.0
Products affected by CVE-2016-0706
-
cpe:2.3:a:apache:tomcat:6.0.0
-
cpe:2.3:a:apache:tomcat:6.0.1
-
cpe:2.3:a:apache:tomcat:6.0.10
-
cpe:2.3:a:apache:tomcat:6.0.11
-
cpe:2.3:a:apache:tomcat:6.0.13
-
cpe:2.3:a:apache:tomcat:6.0.14
-
cpe:2.3:a:apache:tomcat:6.0.16
-
cpe:2.3:a:apache:tomcat:6.0.18
-
cpe:2.3:a:apache:tomcat:6.0.2
-
cpe:2.3:a:apache:tomcat:6.0.20
-
cpe:2.3:a:apache:tomcat:6.0.24
-
cpe:2.3:a:apache:tomcat:6.0.26
-
cpe:2.3:a:apache:tomcat:6.0.28
-
cpe:2.3:a:apache:tomcat:6.0.29
-
cpe:2.3:a:apache:tomcat:6.0.30
-
cpe:2.3:a:apache:tomcat:6.0.32
-
cpe:2.3:a:apache:tomcat:6.0.33
-
cpe:2.3:a:apache:tomcat:6.0.35
-
cpe:2.3:a:apache:tomcat:6.0.36
-
cpe:2.3:a:apache:tomcat:6.0.37
-
cpe:2.3:a:apache:tomcat:6.0.39
-
cpe:2.3:a:apache:tomcat:6.0.4
-
cpe:2.3:a:apache:tomcat:6.0.41
-
cpe:2.3:a:apache:tomcat:6.0.43
-
cpe:2.3:a:apache:tomcat:6.0.44
-
cpe:2.3:a:apache:tomcat:7.0.0
-
cpe:2.3:a:apache:tomcat:7.0.10
-
cpe:2.3:a:apache:tomcat:7.0.11
-
cpe:2.3:a:apache:tomcat:7.0.12
-
cpe:2.3:a:apache:tomcat:7.0.14
-
cpe:2.3:a:apache:tomcat:7.0.16
-
cpe:2.3:a:apache:tomcat:7.0.19
-
cpe:2.3:a:apache:tomcat:7.0.2
-
cpe:2.3:a:apache:tomcat:7.0.20
-
cpe:2.3:a:apache:tomcat:7.0.21
-
cpe:2.3:a:apache:tomcat:7.0.22
-
cpe:2.3:a:apache:tomcat:7.0.23
-
cpe:2.3:a:apache:tomcat:7.0.25
-
cpe:2.3:a:apache:tomcat:7.0.26
-
cpe:2.3:a:apache:tomcat:7.0.27
-
cpe:2.3:a:apache:tomcat:7.0.28
-
cpe:2.3:a:apache:tomcat:7.0.29
-
cpe:2.3:a:apache:tomcat:7.0.30
-
cpe:2.3:a:apache:tomcat:7.0.32
-
cpe:2.3:a:apache:tomcat:7.0.33
-
cpe:2.3:a:apache:tomcat:7.0.34
-
cpe:2.3:a:apache:tomcat:7.0.35
-
cpe:2.3:a:apache:tomcat:7.0.37
-
cpe:2.3:a:apache:tomcat:7.0.39
-
cpe:2.3:a:apache:tomcat:7.0.4
-
cpe:2.3:a:apache:tomcat:7.0.40
-
cpe:2.3:a:apache:tomcat:7.0.41
-
cpe:2.3:a:apache:tomcat:7.0.42
-
cpe:2.3:a:apache:tomcat:7.0.47
-
cpe:2.3:a:apache:tomcat:7.0.5
-
cpe:2.3:a:apache:tomcat:7.0.50
-
cpe:2.3:a:apache:tomcat:7.0.52
-
cpe:2.3:a:apache:tomcat:7.0.53
-
cpe:2.3:a:apache:tomcat:7.0.54
-
cpe:2.3:a:apache:tomcat:7.0.55
-
cpe:2.3:a:apache:tomcat:7.0.56
-
cpe:2.3:a:apache:tomcat:7.0.57
-
cpe:2.3:a:apache:tomcat:7.0.59
-
cpe:2.3:a:apache:tomcat:7.0.6
-
cpe:2.3:a:apache:tomcat:7.0.61
-
cpe:2.3:a:apache:tomcat:7.0.62
-
cpe:2.3:a:apache:tomcat:7.0.63
-
cpe:2.3:a:apache:tomcat:7.0.64
-
cpe:2.3:a:apache:tomcat:7.0.65
-
cpe:2.3:a:apache:tomcat:7.0.67
-
cpe:2.3:a:apache:tomcat:8.0.0
-
cpe:2.3:a:apache:tomcat:8.0.1
-
cpe:2.3:a:apache:tomcat:8.0.11
-
cpe:2.3:a:apache:tomcat:8.0.12
-
cpe:2.3:a:apache:tomcat:8.0.14
-
cpe:2.3:a:apache:tomcat:8.0.15
-
cpe:2.3:a:apache:tomcat:8.0.17
-
cpe:2.3:a:apache:tomcat:8.0.18
-
cpe:2.3:a:apache:tomcat:8.0.20
-
cpe:2.3:a:apache:tomcat:8.0.21
-
cpe:2.3:a:apache:tomcat:8.0.22
-
cpe:2.3:a:apache:tomcat:8.0.23
-
cpe:2.3:a:apache:tomcat:8.0.24
-
cpe:2.3:a:apache:tomcat:8.0.26
-
cpe:2.3:a:apache:tomcat:8.0.27
-
cpe:2.3:a:apache:tomcat:8.0.28
-
cpe:2.3:a:apache:tomcat:8.0.29
-
cpe:2.3:a:apache:tomcat:8.0.3
-
cpe:2.3:a:apache:tomcat:8.0.30
-
cpe:2.3:a:apache:tomcat:9.0.0
-
cpe:2.3:o:canonical:ubuntu_linux:12.04
-
cpe:2.3:o:canonical:ubuntu_linux:14.04
-
cpe:2.3:o:canonical:ubuntu_linux:15.10
-
cpe:2.3:o:canonical:ubuntu_linux:16.04
-
cpe:2.3:o:debian:debian_linux:7.0
-
cpe:2.3:o:debian:debian_linux:8.0