CVE-2016-0714 – org.apache.tomcat:tomcat
Package
Manager: maven
Name: org.apache.tomcat:tomcat
Vulnerable Version: =9.0.0.m1 || >=9.0.0.m1 <9.0.0.m2 || >=8.0.0.rc1 <8.0.32 || >=7.0.0 <7.0.70 || >=6.0.0 <6.0.46
Severity
Level: High
CVSS v3.1: CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H
CVSS v4.0: CVSS:4.0/AV:N/AC:L/AT:N/PR:L/UI:N/VC:H/VI:H/VA:H/SC:H/SI:H/SA:H
EPSS: 0.10248 pctl0.92871
Details
Improper Access Control in Apache Tomcat The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Metadata
Created: 2022-05-14T01:10:17Z
Modified: 2024-02-29T23:35:56Z
Source: https://github.com/github/advisory-database/blob/main/advisories/github-reviewed/2022/05/GHSA-mv42-px54-87jw/GHSA-mv42-px54-87jw.json
CWE IDs: ["CWE-284"]
Alternative ID: GHSA-mv42-px54-87jw
Finding: F039
Auto approve: 1