Hi all,
I'm curious about the severity of CVE-2016-6816 fixed last November.
http://svn.apache.org/viewvc?view=revision&revision=1767653

I see that vendors backported this fix (over time).
http://www.securitytracker.com/id/1037332
Severity is described as Important, Moderate, CVSS v2 Medium, and CVSS v3 High.
"A remote user can exploit this to spoof content on the target server, attempt 
to poison any intermediate web caches, or conduct cross-site scripting attacks."
This sounds pretty serious. If my server is running a vulnerable version of 
Tomcat, how easy is it to exploit? Must webapps use cookies as some example 
exploits have shown? "By manipulating the HTTP response the attacker could... 
obtain sensitive information from requests other then their own." So if trusted 
users are logging in, untrusted users could obtain passwords? Path or query 
parameters?
Thanks, Justin

Reply via email to