Advisory Database
  • Advisories
  • Dependency Scanning
  1. maven
  2. ›
  3. org.apache.tomcat.embed/tomcat-embed-core
  4. ›
  5. CVE-2016-8745

CVE-2016-8745: Information Exposure

August 10, 2017 (updated April 15, 2019)

A bug in the error handling of the NIO HTTP connector in Apache Tomcat resulted in the current Processor object being added to the Processor cache multiple times. This in turn meant that the same Processor could be used for concurrent requests. Sharing a Processor can result in information leakage.

References

  • www.securityfocus.com/bid/94828
  • www.securitytracker.com/id/1037432
  • lists.apache.org/thread.html/4113c05d37f37c12b8033205684f04033c5f7a9bae117d4af23b32b4@%3Cannounce.tomcat.apache.org%3E
  • nvd.nist.gov/vuln/detail/CVE-2016-8745
  • security.gentoo.org/glsa/201705-09

Code Behaviors & Features

Detect and mitigate CVE-2016-8745 with GitLab Dependency Scanning

Secure your software supply chain by verifying that all open source dependencies used in your projects contain no disclosed vulnerabilities. Learn more about Dependency Scanning →

Affected versions

All versions starting from 7.0.0 up to 7.0.9, all versions starting from 7.0.11 up to 7.0.50, all versions starting from 7.0.52 up to 7.0.73, all versions starting from 8.0 up to 8.0.39, all versions starting from 8.5.0 up to 8.5.8, version 9.0.0

Fixed versions

  • 7.0.75
  • 8.0.41
  • 8.5.9
  • 9.0.1

Solution

Upgrade to versions 7.0.75, 8.0.41, 8.5.9, 9.0.1 or above.

Impact 7.5 HIGH

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

Learn more about CVSS

Weakness

  • CWE-388

Source file

maven/org.apache.tomcat.embed/tomcat-embed-core/CVE-2016-8745.yml

Spotted a mistake? Edit the file on GitLab.

  • Site Repo
  • About GitLab
  • Terms
  • Privacy Statement
  • Contact

Page generated Mon, 12 May 2025 12:15:25 +0000.