# N/A
## 漏洞概述
Apache Tomcat 中的 JmxRemoteLifecycleListener 组件在特定版本中存在远程代码执行漏洞,如果攻击者能够访问 JMX 端口,即可利用该漏洞。
## 影响版本
- 6.0.x: 6.0.0 至 6.0.47
- 7.x: 7.0.0 至 7.0.72
- 8.x: 8.0.0 至 8.0.38, 8.5.0 至 8.5.6
- 9.x: 9.0.0 至 9.0.0.M11
## 漏洞细节
该漏洞是因为 JmxRemoteLifecycleListener 组件未更新以适应 Oracle 补丁 CVE-2016-3427,导致认证类型方面的一致性问题。
## 影响
攻击者能够通过 JMX 端口触发漏洞,从而执行远程代码。
| # | POC 描述 | 源链接 | 神龙链接 |
|---|---|---|---|
| 1 | None | https://github.com/ianxtianxt/CVE-2016-8735 | POC详情 |
| 2 | Apache Tomcat versions before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 are vulnerable to remote code execution if JmxRemoteLifecycleListener is used and the JMX ports are exposed to attackers. The vulnerability exists due to inconsistent credential type handling, which was not aligned with the CVE-2016-3427 Oracle patch. Attackers with access to JMX ports can exploit this issue to execute arbitrary code remotely. | https://github.com/projectdiscovery/nuclei-templates/blob/main/http/cves/2016/CVE-2016-8735.yaml | POC详情 |
| 3 | Apache Tomcat versions before 6.0.48, 7.x before 7.0.73, 8.x before 8.0.39, 8.5.x before 8.5.7, and 9.x before 9.0.0.M12 are vulnerable to remote code execution if JmxRemoteLifecycleListener is used and the JMX ports are exposed to attackers. The vulnerability exists due to inconsistent credential type handling, which was not aligned with the CVE-2016-3427 Oracle patch. Attackers with access to JMX ports can exploit this issue to execute arbitrary code remotely. | https://github.com/projectdiscovery/nuclei-templates/blob/main/code/cves/2016/CVE-2016-8735.yaml | POC详情 |
暂无评论