icon

We found results for “

CVE-2016-0714

Good to know:

icon
icon

Date: February 24, 2016

The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.

Language: Java

Severity Score

Related Resources (54)

Severity Score

Weakness Type (CWE)

Permissions, Privileges, and Access Control

CWE-264

Top Fix

icon

Upgrade Version

Upgrade to version org.apache.tomcat.embed:tomcat-embed-core:9.0.0.M3,8.0.32,7.0.68,org.apache.tomcat:tomcat-catalina:9.0.0.M3,8.0.32,7.0.68,org.apache.tomcat:catalina:6.0.45,org.apache.tomcat:catalina-ha:6.0.45,org.apache.tomcat:tomcat-catalina-ha:9.0.0.M3,8.0.32,7.0.68

Learn More

CVSS v3.1

Base Score:
Attack Vector (AV): NETWORK
Attack Complexity (AC): LOW
Privileges Required (PR): LOW
User Interaction (UI): NONE
Scope (S): UNCHANGED
Confidentiality (C): HIGH
Integrity (I): HIGH
Availability (A): HIGH

CVSS v2

Base Score:
Access Vector (AV): NETWORK
Access Complexity (AC): LOW
Authentication (AU): SINGLE
Confidentiality (C): PARTIAL
Integrity (I): PARTIAL
Availability (A): PARTIAL
Additional information:

Do you need more information?

Contact Us