VYPR
High severity7.5NVD Advisory· Published Mar 14, 2017· Updated Apr 16, 2026

CVE-2016-8747

CVE-2016-8747

Description

An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be associated with a different request.

Affected packages

Versions sourced from the GitHub Security Advisory.

PackageAffected versionsPatched versions
org.apache.tomcat:tomcatMaven
>= 8.5.7, < 8.5.108.5.10
org.apache.tomcat:tomcatMaven
>= 9.0.0.M11, < 9.0.0.M169.0.0.M16

Affected products

8
  • cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
  • cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
  • Apache/Tomcat6 versions
    cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*+ 5 more
    • cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*range: >=8.5.7,<8.5.10
    • cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*
    • cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*
    • cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*
    • cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*
    • cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*

Patches

2
9601a937ff3b

Fix intermittent test failure spotted during some refactoring.

https://github.com/apache/tomcatMark ThomasDec 14, 2016via ghsa
2 files changed · +14 5
  • java/org/apache/coyote/http11/Http11InputBuffer.java+9 5 modified
    @@ -296,12 +296,16 @@ void recycle() {
         void nextRequest() {
             request.recycle();
     
    -        // Copy leftover bytes to the beginning of the buffer
    -        if (byteBuffer.remaining() > 0 && byteBuffer.position() > 0) {
    -            byteBuffer.compact();
    +        if (byteBuffer.position() > 0) {
    +            if (byteBuffer.remaining() > 0) {
    +                // Copy leftover bytes to the beginning of the buffer
    +                byteBuffer.compact();
    +                byteBuffer.flip();
    +            } else {
    +                // Reset position and limit to 0
    +                byteBuffer.position(0).limit(0);
    +            }
             }
    -        // Always reset pos to zero
    -        byteBuffer.limit(byteBuffer.limit() - byteBuffer.position()).position(0);
     
             // Recycle filters
             for (int i = 0; i <= lastActiveFilter; i++) {
    
  • webapps/docs/changelog.xml+5 0 modified
    @@ -83,6 +83,11 @@
             when configured with an address of <code>0.0.0.0</code> or
             <code>::</code>. (markt)
           </fix>
    +      <fix>
    +        Correct a regression in the refactoring to make wider use of
    +        <code>ByteBuffer</code> that caused an intermittent failure in the unit
    +        tests. (markt)
    +      </fix>
         </changelog>
       </subsection>
       <subsection name="Web Applications">
    
452c8094a665

Fix intermittent test failure spotted during some refactoring.

https://github.com/apache/tomcatMark ThomasDec 14, 2016via ghsa
2 files changed · +6 0
  • java/org/apache/coyote/http11/Http11InputBuffer.java+1 0 modified
    @@ -284,6 +284,7 @@ void nextRequest() {
             // Copy leftover bytes to the beginning of the buffer
             if (byteBuffer.remaining() > 0 && byteBuffer.position() > 0) {
                 byteBuffer.compact();
    +            byteBuffer.flip();
             }
             // Always reset pos to zero
             byteBuffer.limit(byteBuffer.limit() - byteBuffer.position()).position(0);
    
  • webapps/docs/changelog.xml+5 0 modified
    @@ -87,6 +87,11 @@
             when configured with an address of <code>0.0.0.0</code> or
             <code>::</code>. (markt)
           </fix>
    +      <fix>
    +        Correct a regression in the refactoring to make wider use of
    +        <code>ByteBuffer</code> that caused an intermittent failure in the unit
    +        tests. (markt)
    +      </fix>
         </changelog>
       </subsection>
       <subsection name="Web Applications">
    

Vulnerability mechanics

Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.

References

24

News mentions

0

No linked articles in our index yet.