Skip to main content

CVE-2016-0714

Severity

6.3

Description

The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.

Mitigation

We recommend upgrading to a version of this component that is not vulnerable to this specific issue.

Workaround:
A potential workaround is to disable session persistence for all hosted web applications. To determine how this is done, please reference the following link.
[https://tomcat.apache.org/tomcat-7.0-doc/config/manager.html#Disable_Session_Persistence](https://tomcat.apache.org/tomcat-7.0-doc/config/manager.html#Disable_Session_Persistence)

Project

Apache Tomcat

Apache TomEE

Category
n/a
Tags
data
configuration
functional
Date Disclosed

2016-02-24

Date Discovered

2015-12-16

Apache Tomcat 6.0.x

First release:
2007-02-28
First release:
2016-12-31
CVEs:
50
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.7.x

First release:
2014-08-09
CVEs:
95
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.6.x

First release:
2013-11-17
CVEs:
108
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.5.x

First release:
2012-09-28
CVEs:
119
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.0.x

First release:
2012-04-27
CVEs:
130
Support Lifecycle:
Namespace:
javax
Feel Vulnerable? 

Contact us so we can help you.

* These fields are required.