CVE-2016-6816

Public on 2016-12-15
Modified on 2017-03-29
Description
It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.
Severity
Medium severity
Medium
CVSS v3 Base Score
6.5
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
HAQM Linux 1 tomcat6 2016-12-15 ALAS-2016-776 Fixed
HAQM Linux 1 tomcat6 2017-03-29 ALAS-2017-810 Fixed
HAQM Linux 1 tomcat7 2016-12-15 ALAS-2016-777 Fixed
HAQM Linux 1 tomcat8 2016-12-15 ALAS-2016-778 Fixed

CVSS Scores

Score Type Score Vector
HAQM Linux CVSSv2 5.8 AV:N/AC:M/Au:N/C:P/I:P/A:N
HAQM Linux CVSSv3 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
NVD CVSSv2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
NVD CVSSv3 7.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L