Lookup for vulnerabilities affecting packages.

Vulnerability_idVCID-ph7z-4q8j-kqbf
Summarytomcat: Local privilege escalation via systemd-tmpfiles service
Aliases
0
alias CVE-2016-5425
Fixed_packages
Affected_packages
0
url pkg:rpm/redhat/tomcat@7.0.54-8?arch=el7_2
purl pkg:rpm/redhat/tomcat@7.0.54-8?arch=el7_2
is_vulnerable true
affected_by_vulnerabilities
0
vulnerability VCID-7cpu-h5fr-8ffd
1
vulnerability VCID-c12c-fsy1-17ee
2
vulnerability VCID-kyb8-rvyw-s7b1
3
vulnerability VCID-msy8-g5w8-afbd
4
vulnerability VCID-ph7z-4q8j-kqbf
resource_url http://public2.vulnerablecode.io/packages/pkg:rpm/redhat/tomcat@7.0.54-8%3Farch=el7_2
References
0
reference_url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5425.json
reference_id
reference_type
scores
0
value 7.0
scoring_system cvssv3
scoring_elements CVSS:3.0/AV:L/AC:H/PR:L/UI:N/S:U/C:H/I:H/A:H
url https://access.redhat.com/hydra/rest/securitydata/cve/CVE-2016-5425.json
1
reference_url https://api.first.org/data/v1/epss?cve=CVE-2016-5425
reference_id
reference_type
scores
0
value 0.11552
scoring_system epss
scoring_elements 0.93594
published_at 2026-04-01T12:55:00Z
1
value 0.11552
scoring_system epss
scoring_elements 0.93604
published_at 2026-04-02T12:55:00Z
2
value 0.11552
scoring_system epss
scoring_elements 0.93613
published_at 2026-04-04T12:55:00Z
3
value 0.11552
scoring_system epss
scoring_elements 0.93614
published_at 2026-04-07T12:55:00Z
4
value 0.11552
scoring_system epss
scoring_elements 0.93623
published_at 2026-04-08T12:55:00Z
5
value 0.11552
scoring_system epss
scoring_elements 0.93626
published_at 2026-04-09T12:55:00Z
6
value 0.11552
scoring_system epss
scoring_elements 0.93631
published_at 2026-04-12T12:55:00Z
7
value 0.11552
scoring_system epss
scoring_elements 0.93632
published_at 2026-04-13T12:55:00Z
8
value 0.11552
scoring_system epss
scoring_elements 0.9365
published_at 2026-04-16T12:55:00Z
9
value 0.11552
scoring_system epss
scoring_elements 0.93656
published_at 2026-04-18T12:55:00Z
10
value 0.11552
scoring_system epss
scoring_elements 0.93661
published_at 2026-04-21T12:55:00Z
11
value 0.11552
scoring_system epss
scoring_elements 0.93665
published_at 2026-04-24T12:55:00Z
12
value 0.11552
scoring_system epss
scoring_elements 0.93664
published_at 2026-04-26T12:55:00Z
13
value 0.11552
scoring_system epss
scoring_elements 0.93662
published_at 2026-04-29T12:55:00Z
14
value 0.11552
scoring_system epss
scoring_elements 0.9367
published_at 2026-05-05T12:55:00Z
15
value 0.11552
scoring_system epss
scoring_elements 0.93682
published_at 2026-05-07T12:55:00Z
16
value 0.11552
scoring_system epss
scoring_elements 0.9369
published_at 2026-05-09T12:55:00Z
17
value 0.11552
scoring_system epss
scoring_elements 0.93691
published_at 2026-05-11T12:55:00Z
18
value 0.11552
scoring_system epss
scoring_elements 0.93697
published_at 2026-05-12T12:55:00Z
19
value 0.11552
scoring_system epss
scoring_elements 0.9371
published_at 2026-05-14T12:55:00Z
20
value 0.11552
scoring_system epss
scoring_elements 0.93716
published_at 2026-05-15T12:55:00Z
url https://api.first.org/data/v1/epss?cve=CVE-2016-5425
2
reference_url https://bugzilla.redhat.com/show_bug.cgi?id=1362545
reference_id 1362545
reference_type
scores
url https://bugzilla.redhat.com/show_bug.cgi?id=1362545
3
reference_url http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
reference_id CVE-2016-5425
reference_type exploit
scores
url http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
4
reference_url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40488.txt
reference_id CVE-2016-5425
reference_type exploit
scores
url https://gitlab.com/exploit-database/exploitdb/-/blob/main/exploits/linux/local/40488.txt
Weaknesses
0
cwe_id 284
name Improper Access Control
description The product does not restrict or incorrectly restricts access to a resource from an unauthorized actor.
Exploits
0
date_added 2016-10-10
description Apache Tomcat 8/7/6 (RedHat Based Distros) - Local Privilege Escalation
required_action null
due_date null
notes null
known_ransomware_campaign_use false
source_date_published 2016-10-10
exploit_type local
platform linux
source_date_updated 2016-10-10
data_source Exploit-DB
source_url http://legalhackers.com/advisories/Tomcat-RedHat-Pkgs-Root-PrivEsc-Exploit-CVE-2016-5425.html
1
date_added null
description
This module exploits a vulnerability in RedHat based systems where
          improper file permissions are applied to /usr/lib/tmpfiles.d/tomcat.conf
          for Apache Tomcat versions before 7.0.54-8.  This may also work against

          The configuration files in tmpfiles.d are used by systemd-tmpfiles to manage
          temporary files including their creation.

          With this weak permission, we're able to inject commands into systemd-tmpfiles
          service to write a cron job to execute our payload.

          systemd-tmpfiles is executed by default on boot on RedHat-based systems
          through systemd-tmpfiles-setup.service. Depending on the system in use,
          the execution of systemd-tmpfiles could also be triggered by other
          services, cronjobs, startup scripts etc.

          This module was tested against Tomcat 7.0.54-3 on Fedora 21.
required_action null
due_date null
notes
Stability:
  - crash-safe
Reliability:
  - repeatable-session
SideEffects:
  - artifacts-on-disk
  - config-changes
  - ioc-in-logs
known_ransomware_campaign_use false
source_date_published 2016-10-10
exploit_type null
platform Linux
source_date_updated null
data_source Metasploit
source_url https://github.com/rapid7/metasploit-framework/tree/master/modules/exploits/linux/local/tomcat_rhel_based_temp_priv_esc.rb
Severity_range_score7.0 - 7.0
Exploitability2.0
Weighted_severity6.3
Risk_score10.0
Resource_urlhttp://public2.vulnerablecode.io/vulnerabilities/VCID-ph7z-4q8j-kqbf