In Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 a malicious web application was able to bypass a configured SecurityManager via a Tomcat utility method that was accessible to web applications.
References
Link Providers
http://packetstormsecurity.com/files/155873/Tomcat-9.0.0.M1-Sandbox-Escape.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2017-0457.html cve-icon cve-icon
http://rhn.redhat.com/errata/RHSA-2017-1551.html cve-icon cve-icon
http://www.debian.org/security/2016/dsa-3720 cve-icon cve-icon
http://www.securityfocus.com/bid/93942 cve-icon cve-icon
http://www.securitytracker.com/id/1037142 cve-icon cve-icon
http://www.securitytracker.com/id/1038757 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:0455 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:0456 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1548 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1549 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1550 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:1552 cve-icon cve-icon
https://access.redhat.com/errata/RHSA-2017:2247 cve-icon cve-icon
https://lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/388a323769f1dff84c9ec905455aa73fbcb20338e3c7eb131457f708%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/3d19773b4cf0377db62d1e9328bf9160bf1819f04f988315086931d7%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/845312a10aabbe2c499fca94003881d2c79fc993d85f34c1f5c77424%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/9b3a63a20c87179815fdea14f6766853bafe79a0042dc0b4aa878a9e%40%3Cannounce.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E cve-icon cve-icon
https://nvd.nist.gov/vuln/detail/CVE-2016-5018 cve-icon
https://security.netapp.com/advisory/ntap-20180605-0001/ cve-icon cve-icon
https://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.47 cve-icon
https://tomcat.apache.org/security-7.html#Fixed_in_Apache_Tomcat_7.0.72 cve-icon
https://tomcat.apache.org/security-8.html#Fixed_in_Apache_Tomcat_8.5.5_and_8.0.37 cve-icon
https://usn.ubuntu.com/4557-1/ cve-icon cve-icon
https://www.cve.org/CVERecord?id=CVE-2016-5018 cve-icon
https://www.oracle.com/security-alerts/cpuoct2021.html cve-icon cve-icon
History

No history.

cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published: 2017-08-10T16:00:00Z

Updated: 2024-09-16T18:38:35.797Z

Reserved: 2016-05-24T00:00:00

Link: CVE-2016-5018

cve-icon Vulnrichment

No data.

cve-icon NVD

Status : Modified

Published: 2017-08-10T16:29:00.407

Modified: 2023-12-08T16:41:18.860

Link: CVE-2016-5018

cve-icon Redhat

Severity : Low

Publid Date: 2016-10-27T00:00:00Z

Links: CVE-2016-5018 - Bugzilla