Remote code execution is possible with Apache Tomcat before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 if JmxRemoteLifecycleListener is used and an attacker can reach JMX ports. The issue exists because this listener wasn't updated for consistency with the CVE-2016-3427 Oracle patch that affected credential types.
{
"versions": [
{
"introduced": "7.0.0"
},
{
"fixed": "7.0.73"
},
{
"introduced": "8.5.0"
},
{
"fixed": "8.5.7"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-NA"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone1"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone10"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone11"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone2"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone3"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone4"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone5"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone6"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone7"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone8"
},
{
"introduced": "0"
},
{
"last_affected": "9.0.0-milestone9"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.1"
},
{
"introduced": "0"
},
{
"last_affected": "10.0.1"
}
]
}[
{
"events": [
{
"introduced": "0"
},
{
"fixed": "6.0.48"
}
]
},
{
"events": [
{
"introduced": "8.0"
},
{
"fixed": "8.0.39"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "16.04"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.0.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.1.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2.1.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.3.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "9.3.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.7.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "4.2.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.8"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "11.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.5.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.6.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.7.7"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.8.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "10.8.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "3.2.8.2223"
}
]
},
{
"events": [
{
"introduced": "3.3.0"
},
{
"last_affected": "3.3.4.3247"
}
]
},
{
"events": [
{
"introduced": "3.4.0"
},
{
"last_affected": "3.4.2.4181"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "2.1.132"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.0"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.1"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.2"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.3"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.4"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.5"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.6"
}
]
},
{
"events": [
{
"introduced": "0"
},
{
"last_affected": "6.3.7"
}
]
}
]
"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-8735.json"