First published: Tue Feb 23 2016(Updated: )
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/tomcat | <6.0.45 | 6.0.45 |
redhat/tomcat | <7.0.68 | 7.0.68 |
redhat/tomcat | <8.0.32 | 8.0.32 |
maven/org.apache.tomcat:tomcat | >=6.0.0<6.0.46 | 6.0.46 |
maven/org.apache.tomcat:tomcat | >=7.0.0<7.0.70 | 7.0.70 |
maven/org.apache.tomcat:tomcat | >=8.0.0.RC1<8.0.32 | 8.0.32 |
maven/org.apache.tomcat:tomcat | =9.0.0.M1 | 9.0.0.M2 |
Apache Tomcat | =6.0.0 | |
Apache Tomcat | =6.0.0-alpha | |
Apache Tomcat | =6.0.1 | |
Apache Tomcat | =6.0.1-alpha | |
Apache Tomcat | =6.0.2 | |
Apache Tomcat | =6.0.2-alpha | |
Apache Tomcat | =6.0.2-beta | |
Apache Tomcat | =6.0.4 | |
Apache Tomcat | =6.0.4-alpha | |
Apache Tomcat | =6.0.10 | |
Apache Tomcat | =6.0.11 | |
Apache Tomcat | =6.0.13 | |
Apache Tomcat | =6.0.14 | |
Apache Tomcat | =6.0.16 | |
Apache Tomcat | =6.0.18 | |
Apache Tomcat | =6.0.20 | |
Apache Tomcat | =6.0.24 | |
Apache Tomcat | =6.0.26 | |
Apache Tomcat | =6.0.28 | |
Apache Tomcat | =6.0.29 | |
Apache Tomcat | =6.0.30 | |
Apache Tomcat | =6.0.32 | |
Apache Tomcat | =6.0.33 | |
Apache Tomcat | =6.0.35 | |
Apache Tomcat | =6.0.36 | |
Apache Tomcat | =6.0.37 | |
Apache Tomcat | =6.0.39 | |
Apache Tomcat | =6.0.41 | |
Apache Tomcat | =6.0.43 | |
Apache Tomcat | =6.0.44 | |
Apache Tomcat | =7.0.0-beta | |
Apache Tomcat | =7.0.2-beta | |
Apache Tomcat | =7.0.4-beta | |
Apache Tomcat | =7.0.5-beta | |
Apache Tomcat | =7.0.6 | |
Apache Tomcat | =7.0.10 | |
Apache Tomcat | =7.0.11 | |
Apache Tomcat | =7.0.12 | |
Apache Tomcat | =7.0.14 | |
Apache Tomcat | =7.0.16 | |
Apache Tomcat | =7.0.19 | |
Apache Tomcat | =7.0.20 | |
Apache Tomcat | =7.0.21 | |
Apache Tomcat | =7.0.22 | |
Apache Tomcat | =7.0.23 | |
Apache Tomcat | =7.0.25 | |
Apache Tomcat | =7.0.26 | |
Apache Tomcat | =7.0.27 | |
Apache Tomcat | =7.0.28 | |
Apache Tomcat | =7.0.29 | |
Apache Tomcat | =7.0.30 | |
Apache Tomcat | =7.0.32 | |
Apache Tomcat | =7.0.33 | |
Apache Tomcat | =7.0.34 | |
Apache Tomcat | =7.0.35 | |
Apache Tomcat | =7.0.37 | |
Apache Tomcat | =7.0.39 | |
Apache Tomcat | =7.0.40 | |
Apache Tomcat | =7.0.41 | |
Apache Tomcat | =7.0.42 | |
Apache Tomcat | =7.0.47 | |
Apache Tomcat | =7.0.50 | |
Apache Tomcat | =7.0.52 | |
Apache Tomcat | =7.0.53 | |
Apache Tomcat | =7.0.54 | |
Apache Tomcat | =7.0.55 | |
Apache Tomcat | =7.0.56 | |
Apache Tomcat | =7.0.57 | |
Apache Tomcat | =7.0.59 | |
Apache Tomcat | =7.0.61 | |
Apache Tomcat | =7.0.62 | |
Apache Tomcat | =7.0.63 | |
Apache Tomcat | =7.0.64 | |
Apache Tomcat | =7.0.65 | |
Apache Tomcat | =7.0.67 | |
Apache Tomcat | =8.0.0-rc1 | |
Apache Tomcat | =8.0.0-rc10 | |
Apache Tomcat | =8.0.0-rc3 | |
Apache Tomcat | =8.0.0-rc5 | |
Apache Tomcat | =8.0.1 | |
Apache Tomcat | =8.0.3 | |
Apache Tomcat | =8.0.11 | |
Apache Tomcat | =8.0.12 | |
Apache Tomcat | =8.0.14 | |
Apache Tomcat | =8.0.15 | |
Apache Tomcat | =8.0.17 | |
Apache Tomcat | =8.0.18 | |
Apache Tomcat | =8.0.20 | |
Apache Tomcat | =8.0.21 | |
Apache Tomcat | =8.0.22 | |
Apache Tomcat | =8.0.23 | |
Apache Tomcat | =8.0.24 | |
Apache Tomcat | =8.0.26 | |
Apache Tomcat | =8.0.27 | |
Apache Tomcat | =8.0.28 | |
Apache Tomcat | =8.0.29 | |
Apache Tomcat | =8.0.30 | |
Apache Tomcat | =9.0.0-milestone1 | |
Debian GNU/Linux | =7.0 | |
Debian GNU/Linux | =8.0 | |
Ubuntu Linux | =12.04 | |
Ubuntu Linux | =14.04 | |
Ubuntu Linux | =15.10 | |
Ubuntu Linux | =16.04 | |
Apache Tomcat | =9.0.0-m1 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2016-0714 has a severity level classified as moderate.
To fix CVE-2016-0714, upgrade to Apache Tomcat version 6.0.45, 7.0.68, 8.0.31, or 9.0.0.M2 or later.
CVE-2016-0714 affects Apache Tomcat versions 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2.
CVE-2016-0714 is a vulnerability in session persistence implementation that can allow code execution by remote authenticated users.
It is strongly advised not to use vulnerable versions of Apache Tomcat, as they pose a security risk allowing unauthorized code execution.