CVE-2016-6816

Public on 2016-12-15
Modified on 2017-03-29
Description
It was discovered that the code that parsed the HTTP request line permitted invalid characters. This could be exploited, in conjunction with a proxy that also permitted the invalid characters but with a different interpretation, to inject data into the HTTP response. By manipulating the HTTP response the attacker could poison a web-cache, perform an XSS attack, or obtain sensitive information from requests other then their own.
Severity
Medium severity
Medium
CVSS v3 Base Score
6.5
See breakdown

Affected Packages

Platform Package Release Date Advisory Status
Amazon Linux 1 tomcat6 2016-12-15 ALAS-2016-776 Fixed
Amazon Linux 1 tomcat6 2017-03-29 ALAS-2017-810 Fixed
Amazon Linux 1 tomcat7 2016-12-15 ALAS-2016-777 Fixed
Amazon Linux 1 tomcat8 2016-12-15 ALAS-2016-778 Fixed

CVSS Scores

Score Type Score Vector
Amazon Linux CVSSv2 5.8 AV:N/AC:M/Au:N/C:P/I:P/A:N
Amazon Linux CVSSv3 6.5 CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:L/A:N
NVD CVSSv2 6.8 AV:N/AC:M/Au:N/C:P/I:P/A:P
NVD CVSSv3 7.1 CVSS:3.0/AV:N/AC:L/PR:N/UI:R/S:C/C:L/I:L/A:L