Description
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45,
7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles
session attributes, which allows remote authenticated users to bypass
intended SecurityManager restrictions and execute arbitrary code in a
privileged context via a web application that places a crafted object in a
session.
Ubuntu-Description
It was discovered that the Tomcat session-persistence implementation
incorrectly handled session attributes. A remote attacker could possibly
use this issue to execute arbitrary code in a privileged context.
Notes
mdeslaur | list of backports is incomplete. Fix is intrusive. |
Package
Upstream: | released
(6.0.45)
|
Ubuntu 18.04 LTS: | DNE
|
Ubuntu 14.04 ESM: | released
(6.0.39-1ubuntu0.1)
|
Ubuntu 20.04 FIPS Compliant: | DNE
|
Patches:
Package
Upstream: | released
(7.0.68-1)
|
Ubuntu 18.04 LTS: | not-affected
(7.0.68-1)
|
Ubuntu 14.04 ESM: | released
(7.0.52-1ubuntu0.6)
|
Ubuntu 20.04 FIPS Compliant: | not-affected
(7.0.68-1)
|
Patches:
Package
Upstream: | released
(8.0.32-1)
|
Ubuntu 18.04 LTS: | not-affected
(8.0.32-1ubuntu1)
|
Ubuntu 16.04 ESM: | not-affected
(8.0.32-1ubuntu1)
|
Ubuntu 14.04 ESM: | DNE
|
Ubuntu 20.04 FIPS Compliant: | not-affected
(8.0.32-1ubuntu1)
|
Patches:
Updated: 2022-04-13 12:09:01 UTC (commit f411bd370d482ef4385c4e751d121a4055fbc009)