The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Metrics
Affected Vendors & Products
Advisories
Source | ID | Title |
---|---|---|
![]() |
DLA-435-1 | tomcat6 security update |
![]() |
DSA-3530-1 | tomcat6 security update |
![]() |
DSA-3552-1 | tomcat7 security update |
![]() |
DSA-3609-1 | tomcat8 security update |
![]() |
EUVD-2022-4624 | The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session. |
![]() |
GHSA-mv42-px54-87jw | Improper Access Control in Apache Tomcat |
![]() |
USN-3024-1 | Tomcat vulnerabilities |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T22:30:03.540Z
Reserved: 2015-12-16T00:00:00
Link: CVE-2016-0714

No data.

Status : Deferred
Published: 2016-02-25T01:59:05.263
Modified: 2025-04-12T10:46:40.837
Link: CVE-2016-0714


No data.