
We found results for “”
CVE-2016-6794
Good to know:


Date: August 10, 2017
When a SecurityManager is configured, a web application's ability to read system properties should be controlled by the SecurityManager. In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70, 6.0.0 to 6.0.45 the system property replacement feature for configuration files could be used by a malicious web application to bypass the SecurityManager and read system properties that should not be visible.
Language: Java
Severity Score
Related Resources (53)
Severity Score
Weakness Type (CWE)
Exposure of Sensitive Information to an Unauthorized Actor
CWE-200Insufficient Information
NVD-CWE-noinfoTop Fix

Upgrade Version
Upgrade to version io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.5.X;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.5.X;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;io.hawt:hawtio-sample-springboot:1.4.15;org.apache.tomcat:tomcat-util-scan:9.0.0.M10;org.apache.tomcat:tomcat-util-scan:8.5.5;org.apache.tomcat:tomcat-util-scan:8.0.37;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.camel:camel-example-spring-boot-metrics:2.17.1;org.apache.tomcat.embed:tomcat-embed-core:8.0.37;org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M10;org.apache.tomcat.embed:tomcat-embed-core:7.0.72;org.apache.tomcat.embed:tomcat-embed-core:8.5.5;org.apache.tomcat:tomcat-coyote:9.0.0.M10;org.apache.tomcat:tomcat-coyote:8.0.37;org.apache.tomcat:tomcat-coyote:8.5.5;org.apache.tomcat:tomcat-coyote:7.0.72;org.apache.tomcat:tomcat-catalina:7.0.72;org.apache.tomcat:tomcat-catalina:8.5.5;org.apache.tomcat:tomcat-catalina:8.0.37;org.apache.tomcat:tomcat-catalina:9.0.0.M10;org.apache.camel:camel-example-spring-boot:2.17.1;org.apache.camel:camel-example-spring-boot:2.17.1;org.apache.camel:camel-example-spring-boot:2.17.1
CVSS v3.1
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | NONE |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | LOW |
Integrity (I): | NONE |
Availability (A): | NONE |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | NONE |
Confidentiality (C): | PARTIAL |
Integrity (I): | NONE |
Availability (A): | NONE |
Additional information: |