Vulnerability Name: | CVE-2016-6325 (CCN-117859) | ||||||||||||||||||||||||||||
Assigned: | 2016-10-10 | ||||||||||||||||||||||||||||
Published: | 2016-10-10 | ||||||||||||||||||||||||||||
Updated: | 2023-02-12 | ||||||||||||||||||||||||||||
Summary: | The Tomcat package on Red Hat Enterprise Linux (RHEL) 5 through 7, JBoss Web Server 3.0, and JBoss EWS 2 uses weak permissions for (1) /etc/sysconfig/tomcat and (2) /etc/tomcat/tomcat.conf, which allows local users to gain privileges by leveraging membership in the tomcat group. | ||||||||||||||||||||||||||||
CVSS v3 Severity: | 7.8 High (CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H) 6.8 Medium (Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (CCN Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
6.8 Medium (REDHAT Temporal CVSS v3.1 Vector: CVSS:3.1/AV:L/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H/E:U/RL:O/RC:C)
| ||||||||||||||||||||||||||||
CVSS v2 Severity: | 7.2 High (CVSS v2 Vector: AV:L/AC:L/Au:N/C:C/I:C/A:C)
| ||||||||||||||||||||||||||||
Vulnerability Type: | CWE-284 | ||||||||||||||||||||||||||||
Vulnerability Consequences: | Gain Privileges | ||||||||||||||||||||||||||||
References: | Source: MITRE Type: CNA CVE-2016-6325 Source: CCN Type: RHSA-2016-2045 Important: tomcat6 security and bug fix update Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: CCN Type: RHSA-2016-2046 Important: tomcat security update Source: secalert@redhat.com Type: Vendor Advisory secalert@redhat.com Source: CCN Type: RHSA-2017-0455 Important: Red Hat JBoss Web Server 3.1.0 security and enhancement update Source: CCN Type: RHSA-2017-0456 Important: Red Hat JBoss Web Server 3.1.0 security and enhancement update Source: CCN Type: RHSA-2017-0457 Important: Red Hat JBoss Web Server security and enhancement update Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: IBM Security Bulletin 1995528 (Rational Build Forge) ulnerabilities in Apache Tomcat and OpenSSL affect Rational BuildForge Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: BID-93478 Apache Tomcat CVE-2016-6325 Local Privilege Escalation Vulnerability Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: secalert@redhat.com Type: UNKNOWN secalert@redhat.com Source: CCN Type: Red Hat Bugzilla Bug 1367447 (CVE-2016-6325) CVE-2016-6325 tomcat: tomcat writable config files allow privilege escalation Source: secalert@redhat.com Type: Issue Tracking, VDB Entry, Vendor Advisory secalert@redhat.com Source: XF Type: UNKNOWN rhel-tomcat-cve20166325-priv-esc(117859) Source: CCN Type: IBM Security Bulletin 3011649 (Resilient) Resilient is vulnerable to Using Components with Known Vulnerabilities Source: CCN Type: WhiteSource Vulnerability Database CVE-2016-6325 | ||||||||||||||||||||||||||||
Vulnerable Configuration: | Configuration RedHat 1: Configuration CCN 1: ![]() | ||||||||||||||||||||||||||||
Oval Definitions | |||||||||||||||||||||||||||||
| |||||||||||||||||||||||||||||
BACK |