- 漏洞ID:1123855
- 漏洞类型:输入验证
- 发布日期:2017-04-04
- 更新时间:2017-05-23
- CVE编号:CVE-2016-6816
- CNNVD-ID:CNNVD-201611-610
- 漏洞平台:Multiple
- CVSS评分:6.8
<a href="https://www.exploit-db.com/exploits/41783" target="_blank">https://www.exploit-db.com/exploits/41783</a><br/> <a href="https://www.securityfocus.com/bid/94461" target="_blank">https://www.securityfocus.com/bid/94461</a><br/> <a href="http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201611-610" target="_blank">http://www.cnnvd.org.cn/web/xxk/ldxqById.tag?CNNVD=CNNVD-201611-610</a><br/>
ApacheTomcat是美国阿帕奇(Apache)软件基金会下属的Jakarta项目的一款轻量级Web应用服务器,它主要用于开发和调试JSP程序,适用于中小型系统。ApacheTomcat中存在安全漏洞,该漏洞源于程序没有正确过滤HTTP请求。攻击者可利用该漏洞实施跨站脚本攻击,获取敏感信息。以下版本受到影响:ApacheTomcat9.0.0.M1至9.0.0.M11版本,8.5.0至8.5.6版本,8.0.0.RC1至8.0.38版本,7.0.0至7.0.72版本,6.0.0至6.0.47版本。
来源:BID
链接:http://www.securityfocus.com/bid/94461
来源:tomcat.apache.org
链接:https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.8
来源:tomcat.apache.org
链接:https://tomcat.apache.org/security-9.html#Fixed_in_Apache_Tomcat_9.0.0.M13
来源:tomcat.apache.org
链接:https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.73
来源:tomcat.apache.org
链接:https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.48
来源:tomcat.apache.org
链接:https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.0.39
来源:NSFOCUS
名称:35455
链接:http://www.nsfocus.net/vulndb/35455