CVE-2016-0714

Priority
Description
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45,
7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles
session attributes, which allows remote authenticated users to bypass
intended SecurityManager restrictions and execute arbitrary code in a
privileged context via a web application that places a crafted object in a
session.
Ubuntu-Description
It was discovered that the Tomcat session-persistence implementation
incorrectly handled session attributes. A remote attacker could possibly
use this issue to execute arbitrary code in a privileged context.
Notes
mdeslaurlist of backports is incomplete. Fix is intrusive.
Package
Upstream:released (6.0.45)
Ubuntu 18.04 LTS:DNE
Ubuntu 14.04 ESM:released (6.0.39-1ubuntu0.1)
Ubuntu 20.04 FIPS Compliant:DNE
Patches:
Upstream:http://svn.apache.org/viewvc?view=revision&revision=1727166
Upstream:http://svn.apache.org/viewvc?view=revision&revision=1727182
Package
Upstream:released (8.0.32-1)
Ubuntu 18.04 LTS:not-affected (8.0.32-1ubuntu1)
Ubuntu 16.04 ESM:not-affected (8.0.32-1ubuntu1)
Ubuntu 14.04 ESM:DNE
Ubuntu 20.04 FIPS Compliant:not-affected (8.0.32-1ubuntu1)
Patches:
Upstream:http://svn.apache.org/viewvc?view=revision&revision=1726196
Upstream:http://svn.apache.org/viewvc?view=revision&revision=1726203
More Information

Updated: 2022-04-13 12:09:01 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)