First published: Tue Feb 23 2016(Updated: )
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.46 | 6.0.46 |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.70 | 7.0.70 |
maven/org.apache.tomcat:tomcat | >=8.0.0.RC1<8.0.32 | 8.0.32 |
maven/org.apache.tomcat:tomcat | =9.0.0.M1 | 9.0.0.M2 |
Apache Tomcat | =6.0.0 | |
Apache Tomcat | =6.0.0-alpha | |
Apache Tomcat | =6.0.1 | |
Apache Tomcat | =6.0.1-alpha | |
Apache Tomcat | =6.0.2 | |
Apache Tomcat | =6.0.2-alpha | |
Apache Tomcat | =6.0.2-beta | |
Apache Tomcat | =6.0.4 | |
Apache Tomcat | =6.0.4-alpha | |
Apache Tomcat | =6.0.10 | |
Apache Tomcat | =6.0.11 | |
Apache Tomcat | =6.0.13 | |
Apache Tomcat | =6.0.14 | |
Apache Tomcat | =6.0.16 | |
Apache Tomcat | =6.0.18 | |
Apache Tomcat | =6.0.20 | |
Apache Tomcat | =6.0.24 | |
Apache Tomcat | =6.0.26 | |
Apache Tomcat | =6.0.28 | |
Apache Tomcat | =6.0.29 | |
Apache Tomcat | =6.0.30 | |
Apache Tomcat | =6.0.32 | |
Apache Tomcat | =6.0.33 | |
Apache Tomcat | =6.0.35 | |
Apache Tomcat | =6.0.36 | |
Apache Tomcat | =6.0.37 | |
Apache Tomcat | =6.0.39 | |
Apache Tomcat | =6.0.41 | |
Apache Tomcat | =6.0.43 | |
Apache Tomcat | =6.0.44 | |
Apache Tomcat | =7.0.0-beta | |
Apache Tomcat | =7.0.2-beta | |
Apache Tomcat | =7.0.4-beta | |
Apache Tomcat | =7.0.5-beta | |
Apache Tomcat | =7.0.6 | |
Apache Tomcat | =7.0.10 | |
Apache Tomcat | =7.0.11 | |
Apache Tomcat | =7.0.12 | |
Apache Tomcat | =7.0.14 | |
Apache Tomcat | =7.0.16 | |
Apache Tomcat | =7.0.19 | |
Apache Tomcat | =7.0.20 | |
Apache Tomcat | =7.0.21 | |
Apache Tomcat | =7.0.22 | |
Apache Tomcat | =7.0.23 | |
Apache Tomcat | =7.0.25 | |
Apache Tomcat | =7.0.26 | |
Apache Tomcat | =7.0.27 | |
Apache Tomcat | =7.0.28 | |
Apache Tomcat | =7.0.29 | |
Apache Tomcat | =7.0.30 | |
Apache Tomcat | =7.0.32 | |
Apache Tomcat | =7.0.33 | |
Apache Tomcat | =7.0.34 | |
Apache Tomcat | =7.0.35 | |
Apache Tomcat | =7.0.37 | |
Apache Tomcat | =7.0.39 | |
Apache Tomcat | =7.0.40 | |
Apache Tomcat | =7.0.41 | |
Apache Tomcat | =7.0.42 | |
Apache Tomcat | =7.0.47 | |
Apache Tomcat | =7.0.50 | |
Apache Tomcat | =7.0.52 | |
Apache Tomcat | =7.0.53 | |
Apache Tomcat | =7.0.54 | |
Apache Tomcat | =7.0.55 | |
Apache Tomcat | =7.0.56 | |
Apache Tomcat | =7.0.57 | |
Apache Tomcat | =7.0.59 | |
Apache Tomcat | =7.0.61 | |
Apache Tomcat | =7.0.62 | |
Apache Tomcat | =7.0.63 | |
Apache Tomcat | =7.0.64 | |
Apache Tomcat | =7.0.65 | |
Apache Tomcat | =7.0.67 | |
Apache Tomcat | =8.0.0-rc1 | |
Apache Tomcat | =8.0.0-rc10 | |
Apache Tomcat | =8.0.0-rc3 | |
Apache Tomcat | =8.0.0-rc5 | |
Apache Tomcat | =8.0.1 | |
Apache Tomcat | =8.0.3 | |
Apache Tomcat | =8.0.11 | |
Apache Tomcat | =8.0.12 | |
Apache Tomcat | =8.0.14 | |
Apache Tomcat | =8.0.15 | |
Apache Tomcat | =8.0.17 | |
Apache Tomcat | =8.0.18 | |
Apache Tomcat | =8.0.20 | |
Apache Tomcat | =8.0.21 | |
Apache Tomcat | =8.0.22 | |
Apache Tomcat | =8.0.23 | |
Apache Tomcat | =8.0.24 | |
Apache Tomcat | =8.0.26 | |
Apache Tomcat | =8.0.27 | |
Apache Tomcat | =8.0.28 | |
Apache Tomcat | =8.0.29 | |
Apache Tomcat | =8.0.30 | |
Apache Tomcat | =9.0.0-milestone1 | |
Debian Debian Linux | =7.0 | |
Debian Debian Linux | =8.0 | |
Canonical Ubuntu Linux | =12.04 | |
Canonical Ubuntu Linux | =14.04 | |
Canonical Ubuntu Linux | =15.10 | |
Canonical Ubuntu Linux | =16.04 | |
Apache Tomcat | =9.0.0-m1 | |
redhat/tomcat | <6.0.45 | 6.0.45 |
redhat/tomcat | <7.0.68 | 7.0.68 |
redhat/tomcat | <8.0.32 | 8.0.32 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.