The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Metrics
Affected Vendors & Products
References
History
No history.
MITRE
Status: PUBLISHED
Assigner: redhat
Published: 2016-02-25T01:00:00
Updated: 2024-08-05T22:30:03.540Z
Reserved: 2015-12-16T00:00:00
Link: CVE-2016-0714
Vulnrichment
No data.
NVD
Status : Modified
Published: 2016-02-25T01:59:05.263
Modified: 2024-11-21T02:42:14.370
Link: CVE-2016-0714
Redhat