Vulnerability CVE-2016-5425


Published: 2016-10-13

Description:
The Tomcat package on Red Hat Enterprise Linux (RHEL) 7, Fedora, CentOS, Oracle Linux, and possibly other Linux distributions uses weak permissions for /usr/lib/tmpfiles.d/tomcat.conf, which allows local users to gain root privileges by leveraging membership in the tomcat group.

See advisories in our WLB2 database:
Topic
Author
Date
High
Apache Tomcat 8 / 7 / 6 Privilege Escalation
Dawid Golunski
10.10.2016
Med.
Apache Tomcat Privilege Escalation
h00die
14.03.2023

Type:

CWE-264

(Permissions, Privileges, and Access Controls)

CVSS2 => (AV:L/AC:L/Au:N/C:C/I:C/A:C)

CVSS Base Score
Impact Subscore
Exploitability Subscore
7.2/10
10/10
3.9/10
Exploit range
Attack complexity
Authentication
Local
Low
No required
Confidentiality impact
Integrity impact
Availability impact
Complete
Complete
Complete
Affected software
Oracle -> Linux 
Apache -> Tomcat 

 References:
http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
http://packetstormsecurity.com/files/139041/Apache-Tomcat-8-7-6-Privilege-Escalation.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
http://www.openwall.com/lists/oss-security/2016/10/10/2
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html
http://www.securityfocus.com/bid/93472
http://www.securitytracker.com/id/1036979
https://www.exploit-db.com/exploits/40488/

Copyright 2024, cxsecurity.com

 

Back to Top