CVE Vulnerabilities

CVE-2016-0763

Published: Feb 25, 2016 | Modified: Apr 12, 2025
CVSS 3.x
6.3
MEDIUM
Source:
NVD
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
CVSS 2.x
6.5 MEDIUM
AV:N/AC:L/Au:S/C:P/I:P/A:P
RedHat/V2
4.3 MODERATE
AV:A/AC:M/Au:N/C:P/I:P/A:N
RedHat/V3
6.3 MODERATE
CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:L/I:L/A:L
Ubuntu
MEDIUM
root.io logo minimus.io logo echo.ai logo

The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.

Affected Software

NameVendorStart VersionEnd Version
Debian_linuxDebian7.0 (including)7.0 (including)
Debian_linuxDebian8.0 (including)8.0 (including)
Red Hat Enterprise Linux 7RedHattomcat-0:7.0.69-10.el7*
Red Hat JBoss Enterprise Web Server 2 for RHEL 6RedHattomcat7-0:7.0.54-23_patch_05.ep6.el6*
Red Hat JBoss Enterprise Web Server 2 for RHEL 7RedHattomcat7-0:7.0.54-23_patch_05.ep6.el7*
Red Hat JBoss Web Server 2.1RedHattomcat7*
Red Hat JBoss Web Server 3.0RedHat*
Red Hat JBoss Web Server 3 for RHEL 6RedHathttpd24-0:2.4.6-61.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHatmod_security-jws3-0:2.8.0-7.GA.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat7-0:7.0.59-50_patch_01.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 6RedHattomcat8-0:8.0.18-61_patch_01.ep7.el6*
Red Hat JBoss Web Server 3 for RHEL 7RedHathttpd24-0:2.4.6-61.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHatmod_security-jws3-0:2.8.0-7.GA.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat7-0:7.0.59-50_patch_01.ep7.el7*
Red Hat JBoss Web Server 3 for RHEL 7RedHattomcat8-0:8.0.18-61_patch_01.ep7.el7*
Tomcat6Ubuntuesm-apps/xenial*
Tomcat6Ubuntuesm-infra-legacy/trusty*
Tomcat6Ubuntuprecise*
Tomcat6Ubuntutrusty*
Tomcat6Ubuntutrusty/esm*
Tomcat6Ubuntuupstream*
Tomcat6Ubuntuwily*
Tomcat6Ubuntuxenial*
Tomcat7Ubuntuesm-infra-legacy/trusty*
Tomcat7Ubuntuprecise*
Tomcat7Ubuntutrusty*
Tomcat7Ubuntutrusty/esm*
Tomcat7Ubuntuupstream*
Tomcat7Ubuntuwily*
Tomcat8Ubuntuupstream*
Tomcat8Ubuntuwily*

References