CVE-2016-0762 (CNNVD-201610-831)
中文标题:
Apache Tomcat 信息泄露漏洞
英文标题:
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 ...
漏洞描述
中文描述:
Apache Tomcat是美国阿帕奇(Apache)软件基金会下属的Jakarta项目的一款轻量级Web应用服务器,它主要用于开发和调试JSP程序,适用于中小型系统。 Apache Tomcat中存在信息泄露漏洞。攻击者可利用该漏洞获取有效的用户名。以下版本受到影响:Apache Tomcat 9.0.0.M1至9.0.0.M9版本,8.5.0至8.5.4版本,8.0.0.RC1至8.0.36版本,7.0.0至7.0.70版本,6.0.0至6.0.45版本。
英文描述:
The Realm implementations in Apache Tomcat versions 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 did not process the supplied password if the supplied user name did not exist. This made a timing attack possible to determine valid user names. Note that the default configuration includes the LockOutRealm which makes exploitation of this vulnerability harder.
CWE类型:
标签:
受影响产品
| 厂商 | 产品 | 版本 | 版本范围 | 平台 | CPE |
|---|---|---|---|---|---|
| Apache Software Foundation | Apache Tomcat | 9.0.0.M1 to 9.0.0.M9 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:9.0.0.m1_to_9.0.0.m9:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache Tomcat | 8.5.0 to 8.5.4 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:8.5.0_to_8.5.4:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache Tomcat | 8.0.0.RC1 to 8.0.36 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:8.0.0.rc1_to_8.0.36:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache Tomcat | 7.0.0 to 7.0.70 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:7.0.0_to_7.0.70:*:*:*:*:*:*:*
|
| Apache Software Foundation | Apache Tomcat | 6.0.0 to 6.0.45 | - | - |
cpe:2.3:a:apache_software_foundation:apache_tomcat:6.0.0_to_6.0.45:*:*:*:*:*:*:*
|
| apache | tomcat | * | - | - |
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
|
| apache | tomcat | 9.0.0 | - | - |
cpe:2.3:a:apache:tomcat:9.0.0:milestone1:*:*:*:*:*:*
|
| canonical | ubuntu_linux | 16.04 | - | - |
cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:esm:*:*:*
|
| debian | debian_linux | 8.0 | - | - |
cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*
|
| redhat | jboss_enterprise_web_server | 3.0.0 | - | - |
cpe:2.3:a:redhat:jboss_enterprise_web_server:3.0.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_desktop | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_desktop:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.5 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.5:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_eus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_eus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server:7.0:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.4 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.4:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_aus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_aus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.6 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.6:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_server_tus | 7.7 | - | - |
cpe:2.3:o:redhat:enterprise_linux_server_tus:7.7:*:*:*:*:*:*:*
|
| redhat | enterprise_linux_workstation | 7.0 | - | - |
cpe:2.3:o:redhat:enterprise_linux_workstation:7.0:*:*:*:*:*:*:*
|
| netapp | oncommand_insight | - | - | - |
cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
|
| netapp | oncommand_shift | - | - | - |
cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
|
| netapp | snap_creator_framework | - | - | - |
cpe:2.3:a:netapp:snap_creator_framework:-:*:*:*:*:*:*:*
|
| oracle | communications_diameter_signaling_router | * | - | - |
cpe:2.3:a:oracle:communications_diameter_signaling_router:*:*:*:*:*:*:*:*
|
| oracle | tekelec_platform_distribution | * | - | - |
cpe:2.3:a:oracle:tekelec_platform_distribution:*:*:*:*:*:*:*:*
|
解决方案
中文解决方案:
英文解决方案:
临时解决方案:
参考链接
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
cve.org
CVSS评分详情
CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
时间信息
利用信息
数据源详情
| 数据源 | 记录ID | 版本 | 提取时间 |
|---|---|---|---|
| CVE | cve_CVE-2016-0762 |
2025-11-11 15:19:03 | 2025-11-11 07:34:12 |
| NVD | nvd_CVE-2016-0762 |
2025-11-11 14:55:13 | 2025-11-11 07:42:53 |
| CNNVD | cnnvd_CNNVD-201610-831 |
2025-11-11 15:09:43 | 2025-11-11 07:52:45 |
版本与语言
安全公告
变更历史
查看详细变更
- vulnerability_type: 未提取 -> 权限许可和访问控制问题
- cnnvd_id: 未提取 -> CNNVD-201610-831
- data_sources: ['cve', 'nvd'] -> ['cnnvd', 'cve', 'nvd']
查看详细变更
- cvss_score: 未提取 -> 5.9
- cvss_vector: NOT_EXTRACTED -> CVSS:3.1/AV:N/AC:H/PR:N/UI:N/S:U/C:H/I:N/A:N
- cvss_version: NOT_EXTRACTED -> 3.1
- affected_products_count: 5 -> 27
- data_sources: ['cve'] -> ['cve', 'nvd']