Executive Summary

Informations
NameCVE-2014-7810First vendor Publication2015-06-07
VendorCveLast vendor Modification2019-04-15

Security-Database Scoring CVSS v2

Cvss vector : (AV:N/AC:L/Au:N/C:N/I:P/A:N)
Cvss Base Score5Attack RangeNetwork
Cvss Impact Score2.9Attack ComplexityLow
Cvss Expoit Score10AuthenticationNone Required
Calculate full CVSS 2.0 Vectors scores

Detail

The Expression Language (EL) implementation in Apache Tomcat 6.x before 6.0.44, 7.x before 7.0.58, and 8.x before 8.0.16 does not properly consider the possibility of an accessible interface implemented by an inaccessible class, which allows attackers to bypass a SecurityManager protection mechanism via a web application that leverages use of incorrect privileges during EL evaluation.

Original Source

Url : http://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2014-7810

CWE : Common Weakness Enumeration

%idName
100 %CWE-284Access Control (Authorization) Issues

CPE : Common Platform Enumeration

TypeDescriptionCount
Application119
Os1
Os1

Information Assurance Vulnerability Management (IAVM)

DateDescription
2015-05-21IAVM : 2015-B-0065 - Apache Tomcat Security Bypass Vulnerability
Severity : Category I - VMSKEY : V0060761

Nessus® Vulnerability Scanner

DateDescription
2017-05-01Name : The remote EulerOS host is missing multiple security updates.
File : EulerOS_SA-2016-1049.nasl - Type : ACT_GATHER_INFO
2016-10-12Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2016-2046.nasl - Type : ACT_GATHER_INFO
2016-10-12Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20161010_tomcat_on_SL7_x.nasl - Type : ACT_GATHER_INFO
2016-10-11Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2016-2046.nasl - Type : ACT_GATHER_INFO
2016-10-11Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2016-2046.nasl - Type : ACT_GATHER_INFO
2016-03-28Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3530.nasl - Type : ACT_GATHER_INFO
2016-03-24Name : The remote Scientific Linux host is missing one or more security updates.
File : sl_20160323_tomcat6_on_SL6_x.nasl - Type : ACT_GATHER_INFO
2016-03-24Name : The remote CentOS host is missing one or more security updates.
File : centos_RHSA-2016-0492.nasl - Type : ACT_GATHER_INFO
2016-03-23Name : The remote Oracle Linux host is missing one or more security updates.
File : oraclelinux_ELSA-2016-0492.nasl - Type : ACT_GATHER_INFO
2016-03-23Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2016-0492.nasl - Type : ACT_GATHER_INFO
2016-03-11Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2016-656.nasl - Type : ACT_GATHER_INFO
2016-03-11Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2016-657.nasl - Type : ACT_GATHER_INFO
2016-03-11Name : The remote Amazon Linux AMI host is missing a security update.
File : ala_ALAS-2016-658.nasl - Type : ACT_GATHER_INFO
2016-01-19Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3447.nasl - Type : ACT_GATHER_INFO
2015-12-21Name : The remote Debian host is missing a security-related update.
File : debian_DSA-3428.nasl - Type : ACT_GATHER_INFO
2015-08-17Name : The remote Red Hat host is missing one or more security updates.
File : redhat-RHSA-2015-1622.nasl - Type : ACT_GATHER_INFO
2015-06-26Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2654-1.nasl - Type : ACT_GATHER_INFO
2015-06-26Name : The remote Ubuntu host is missing a security-related patch.
File : ubuntu_USN-2655-1.nasl - Type : ACT_GATHER_INFO
2015-06-16Name : The remote FreeBSD host is missing one or more security-related updates.
File : freebsd_pkg_25e0593d13c011e59afb3c970e169bc2.nasl - Type : ACT_GATHER_INFO
2015-05-29Name : The remote Debian host is missing a security update.
File : debian_DLA-232.nasl - Type : ACT_GATHER_INFO
2015-05-21Name : The remote Apache Tomcat server is affected by a security bypass vulnerability.
File : tomcat_7_0_59.nasl - Type : ACT_GATHER_INFO
2015-05-21Name : The remote Apache Tomcat server is affected by a security bypass vulnerability.
File : tomcat_8_0_17.nasl - Type : ACT_GATHER_INFO
2015-05-15Name : The remote Apache Tomcat server is affected by multiple vulnerabilities.
File : tomcat_6_0_44.nasl - Type : ACT_GATHER_INFO

Sources (Detail)

SourceUrl
BID http://www.securityfocus.com/bid/74665
CONFIRM http://svn.apache.org/viewvc?view=revision&revision=1644018
http://svn.apache.org/viewvc?view=revision&revision=1645642
http://tomcat.apache.org/security-6.html
http://tomcat.apache.org/security-7.html
http://tomcat.apache.org/security-8.html
http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html
http://www.oracle.com/technetwork/topics/security/bulletinoct2015-2511968.html
http://www.oracle.com/technetwork/topics/security/linuxbulletinapr2016-295209...
http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-309054...
https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_n...
DEBIAN http://www.debian.org/security/2015/dsa-3428
http://www.debian.org/security/2016/dsa-3447
http://www.debian.org/security/2016/dsa-3530
HP http://marc.info/?l=bugtraq&m=145974991225029&w=2
MLIST https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930f...
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04cc...
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930...
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236...
REDHAT http://rhn.redhat.com/errata/RHSA-2015-1621.html
http://rhn.redhat.com/errata/RHSA-2015-1622.html
http://rhn.redhat.com/errata/RHSA-2016-0492.html
http://rhn.redhat.com/errata/RHSA-2016-2046.html
SECTRACK http://www.securitytracker.com/id/1032330
UBUNTU http://www.ubuntu.com/usn/USN-2654-1
http://www.ubuntu.com/usn/USN-2655-1

Alert History

If you want to see full details history, please login or register.
0
1
2
3
4
5
6
7
8
9
10
11
12
13
14
15
16
17
18
19
20
21
22
23
24
25
26
27
28
29
30
31
32
33
34
35
DateInformations
2019-04-15 21:18:58
  • Multiple Updates
2019-04-15 17:18:44
  • Multiple Updates
2019-03-25 17:18:58
  • Multiple Updates
2019-03-21 21:19:11
  • Multiple Updates
2018-07-19 09:19:07
  • Multiple Updates
2017-11-09 09:31:05
  • Multiple Updates
2017-05-02 13:24:37
  • Multiple Updates
2016-12-31 09:24:21
  • Multiple Updates
2016-12-24 09:24:03
  • Multiple Updates
2016-12-07 09:24:13
  • Multiple Updates
2016-12-03 09:23:58
  • Multiple Updates
2016-11-29 00:24:56
  • Multiple Updates
2016-10-27 09:23:56
  • Multiple Updates
2016-10-18 12:04:02
  • Multiple Updates
2016-10-15 09:24:38
  • Multiple Updates
2016-10-13 13:25:06
  • Multiple Updates
2016-10-12 13:24:19
  • Multiple Updates
2016-10-04 09:24:05
  • Multiple Updates
2016-08-26 21:20:47
  • Multiple Updates
2016-08-20 09:22:29
  • Multiple Updates
2016-08-17 09:23:49
  • Multiple Updates
2016-05-27 21:22:54
  • Multiple Updates
2016-04-26 09:25:22
  • Multiple Updates
2016-03-29 13:21:00
  • Multiple Updates
2016-03-25 13:26:21
  • Multiple Updates
2016-03-24 13:25:50
  • Multiple Updates
2016-03-12 13:27:24
  • Multiple Updates
2016-01-20 13:24:06
  • Multiple Updates
2015-12-22 13:25:20
  • Multiple Updates
2015-10-18 17:22:57
  • Multiple Updates
2015-08-18 13:34:52
  • Multiple Updates
2015-06-27 13:28:48
  • Multiple Updates
2015-06-17 13:31:51
  • Multiple Updates
2015-06-12 05:26:28
  • Multiple Updates
2015-06-08 21:26:09
  • Multiple Updates
2015-06-08 05:25:34
  • First insertion