High severity7.5NVD Advisory· Published Mar 14, 2017· Updated Apr 16, 2026
CVE-2016-8747
CVE-2016-8747
Description
An information disclosure issue was discovered in Apache Tomcat 8.5.7 to 8.5.9 and 9.0.0.M11 to 9.0.0.M15 in reverse-proxy configurations. Http11InputBuffer.java allows remote attackers to read data that was intended to be associated with a different request.
Affected packages
Versions sourced from the GitHub Security Advisory.
| Package | Affected versions | Patched versions |
|---|---|---|
org.apache.tomcat:tomcatMaven | >= 8.5.7, < 8.5.10 | 8.5.10 |
org.apache.tomcat:tomcatMaven | >= 9.0.0.M11, < 9.0.0.M16 | 9.0.0.M16 |
Affected products
8- cpe:2.3:a:netapp:oncommand_insight:-:*:*:*:*:*:*:*
- cpe:2.3:a:netapp:oncommand_shift:-:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*+ 5 more
- cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*range: >=8.5.7,<8.5.10
- cpe:2.3:a:apache:tomcat:9.0.0:milestone11:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:9.0.0:milestone12:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:9.0.0:milestone13:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:9.0.0:milestone14:*:*:*:*:*:*
- cpe:2.3:a:apache:tomcat:9.0.0:milestone15:*:*:*:*:*:*
Patches
29601a937ff3bFix intermittent test failure spotted during some refactoring.
2 files changed · +14 −5
java/org/apache/coyote/http11/Http11InputBuffer.java+9 −5 modified@@ -296,12 +296,16 @@ void recycle() { void nextRequest() { request.recycle(); - // Copy leftover bytes to the beginning of the buffer - if (byteBuffer.remaining() > 0 && byteBuffer.position() > 0) { - byteBuffer.compact(); + if (byteBuffer.position() > 0) { + if (byteBuffer.remaining() > 0) { + // Copy leftover bytes to the beginning of the buffer + byteBuffer.compact(); + byteBuffer.flip(); + } else { + // Reset position and limit to 0 + byteBuffer.position(0).limit(0); + } } - // Always reset pos to zero - byteBuffer.limit(byteBuffer.limit() - byteBuffer.position()).position(0); // Recycle filters for (int i = 0; i <= lastActiveFilter; i++) {
webapps/docs/changelog.xml+5 −0 modified@@ -83,6 +83,11 @@ when configured with an address of <code>0.0.0.0</code> or <code>::</code>. (markt) </fix> + <fix> + Correct a regression in the refactoring to make wider use of + <code>ByteBuffer</code> that caused an intermittent failure in the unit + tests. (markt) + </fix> </changelog> </subsection> <subsection name="Web Applications">
452c8094a665Fix intermittent test failure spotted during some refactoring.
2 files changed · +6 −0
java/org/apache/coyote/http11/Http11InputBuffer.java+1 −0 modified@@ -284,6 +284,7 @@ void nextRequest() { // Copy leftover bytes to the beginning of the buffer if (byteBuffer.remaining() > 0 && byteBuffer.position() > 0) { byteBuffer.compact(); + byteBuffer.flip(); } // Always reset pos to zero byteBuffer.limit(byteBuffer.limit() - byteBuffer.position()).position(0);
webapps/docs/changelog.xml+5 −0 modified@@ -87,6 +87,11 @@ when configured with an address of <code>0.0.0.0</code> or <code>::</code>. (markt) </fix> + <fix> + Correct a regression in the refactoring to make wider use of + <code>ByteBuffer</code> that caused an intermittent failure in the unit + tests. (markt) + </fix> </changelog> </subsection> <subsection name="Web Applications">
Vulnerability mechanics
Generated by null/stub on May 9, 2026. Inputs: CWE entries + fix-commit diffs from this CVE's patches. Citations validated against bundle.
References
24- svn.apache.org/viewvcnvdIssue TrackingPatchVendor AdvisoryWEB
- svn.apache.org/viewvcnvdIssue TrackingPatchVendor AdvisoryWEB
- lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551%40%3Cdev.tomcat.apache.org%3EnvdPatchWEB
- lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3%40%3Cdev.tomcat.apache.org%3EnvdPatchWEB
- lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a%40%3Cdev.tomcat.apache.org%3EnvdPatchWEB
- lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc%40%3Cdev.tomcat.apache.org%3EnvdPatchWEB
- lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3EnvdPatchWEB
- lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3EnvdPatchWEB
- tomcat.apache.org/security-8.htmlnvdRelease NotesVendor AdvisoryWEB
- tomcat.apache.org/security-9.htmlnvdRelease NotesVendor AdvisoryWEB
- github.com/advisories/GHSA-fjwp-r6fm-q6qwghsaADVISORY
- nvd.nist.gov/vuln/detail/CVE-2016-8747ghsaADVISORY
- security.netapp.com/advisory/ntap-20180614-0002/nvdThird Party Advisory
- www.securityfocus.com/bid/96895nvdBroken LinkWEB
- github.com/apache/tomcat/commit/452c8094a665ef6375530e81c033da4eeb2e4865ghsaWEB
- github.com/apache/tomcat/commit/9601a937ff3b7ef5d04b2a0e950d0e44e1bb4cbdghsaWEB
- lists.apache.org/thread.html/343558d982879bf88ec20dbf707f8c11255f8e219e81d45c4f8d0551@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/6af47120905aa7d8fe12f42e8ff2284fb338ba141d3b77b8c7cb61b3@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/88855876c33f2f9c532ffb75bfee570ccf0b17ffa77493745af9a17a@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/b5e3f51d28cd5d9b1809f56594f2cf63dcd6a90429e16ea9f83bbedc@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d@%3Cdev.tomcat.apache.org%3EghsaWEB
- lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0@%3Cdev.tomcat.apache.org%3EghsaWEB
- security.netapp.com/advisory/ntap-20180614-0002ghsaWEB
- web.archive.org/web/20200227183332/http://www.securityfocus.com/bid/96895ghsaWEB
News mentions
0No linked articles in our index yet.