CVE-2016-6816

Priority
Description
The code in Apache Tomcat 9.0.0.M1 to 9.0.0.M11, 8.5.0 to 8.5.6, 8.0.0.RC1
to 8.0.38, 7.0.0 to 7.0.72, and 6.0.0 to 6.0.47 that parsed the HTTP
request line permitted invalid characters. This could be exploited, in
conjunction with a proxy that also permitted the invalid characters but
with a different interpretation, to inject data into the HTTP response. By
manipulating the HTTP response the attacker could poison a web-cache,
perform an XSS attack and/or obtain sensitive information from requests
other then their own.
Assigned-to
mdeslaur
Notes
Package
Upstream:released (6.0.48)
Ubuntu 12.04 ESM (Precise Pangolin):released (6.0.35-1ubuntu3.9)
Ubuntu 14.04 ESM (Trusty Tahr):needed
Ubuntu 16.04 LTS (Xenial Xerus):needed
Ubuntu 18.04 LTS (Bionic Beaver):DNE
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Patches:
Upstream:https://svn.apache.org/viewvc?view=revision&revision=1720418 (bp)
Upstream:https://svn.apache.org/viewvc?view=revision&revision=1743650 (bp)
Upstream:http://svn.apache.org/r1767683
Package
Upstream:released (7.0.73)
Ubuntu 12.04 ESM (Precise Pangolin):DNE (precise was needed)
Ubuntu 14.04 ESM (Trusty Tahr):released (7.0.52-1ubuntu0.8)
Ubuntu 16.04 LTS (Xenial Xerus):released (7.0.68-1ubuntu0.3)
Ubuntu 18.04 LTS (Bionic Beaver):not-affected (7.0.73-1)
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Patches:
Upstream:http://svn.apache.org/r1767675
Package
Upstream:released (8.0.39)
Ubuntu 12.04 ESM (Precise Pangolin):DNE
Ubuntu 14.04 ESM (Trusty Tahr):DNE
Ubuntu 16.04 LTS (Xenial Xerus):released (8.0.32-1ubuntu1.3)
Ubuntu 18.04 LTS (Bionic Beaver):released (8.0.38-2ubuntu1)
Ubuntu 20.04 LTS (Focal Fossa):DNE
Ubuntu 20.10 (Groovy Gorilla):DNE
Patches:
Upstream:http://svn.apache.org/r1767653
More Information

Updated: 2020-07-28 18:37:43 UTC (commit 7b6828437fde0509248708fcdb5b0f7587b85bd1)