
We found results for “”
CVE-2016-0714
Good to know:


Date: February 24, 2016
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Language: Java
Severity Score
Related Resources (5)
Severity Score
Weakness Type (CWE)
Permissions, Privileges, and Access Control
CWE-264Top Fix

Upgrade Version
Upgrade to version org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M3,8.0.32,7.0.68,org.apache.tomcat:tomcat-catalina:9.0.0.M3,8.0.32,7.0.68,org.apache.tomcat:catalina:6.0.45,org.apache.tomcat:catalina-ha:6.0.45,org.apache.tomcat:tomcat-catalina-ha:9.0.0.M3,8.0.32,7.0.68
CVSS v3
Base Score: |
|
---|---|
Attack Vector (AV): | NETWORK |
Attack Complexity (AC): | LOW |
Privileges Required (PR): | LOW |
User Interaction (UI): | NONE |
Scope (S): | UNCHANGED |
Confidentiality (C): | HIGH |
Integrity (I): | HIGH |
Availability (A): | HIGH |
CVSS v2
Base Score: |
|
---|---|
Access Vector (AV): | NETWORK |
Access Complexity (AC): | LOW |
Authentication (AU): | SINGLE |
Confidentiality (C): | PARTIAL |
Integrity (I): | PARTIAL |
Availability (A): | PARTIAL |
Additional information: |