CVE-2016-0714
25.02.2016, 01:59
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.Enginsight
| Vendor | Product | Version |
|---|---|---|
| apache | tomcat | 6.0.0 |
| apache | tomcat | 6.0.0:alpha |
| apache | tomcat | 6.0.1 |
| apache | tomcat | 6.0.1:alpha |
| apache | tomcat | 6.0.2 |
| apache | tomcat | 6.0.2:alpha |
| apache | tomcat | 6.0.2:beta |
| apache | tomcat | 6.0.4 |
| apache | tomcat | 6.0.4:alpha |
| apache | tomcat | 6.0.10 |
| apache | tomcat | 6.0.11 |
| apache | tomcat | 6.0.13 |
| apache | tomcat | 6.0.14 |
| apache | tomcat | 6.0.16 |
| apache | tomcat | 6.0.18 |
| apache | tomcat | 6.0.20 |
| apache | tomcat | 6.0.24 |
| apache | tomcat | 6.0.26 |
| apache | tomcat | 6.0.28 |
| apache | tomcat | 6.0.29 |
| apache | tomcat | 6.0.30 |
| apache | tomcat | 6.0.32 |
| apache | tomcat | 6.0.33 |
| apache | tomcat | 6.0.35 |
| apache | tomcat | 6.0.36 |
| apache | tomcat | 6.0.37 |
| apache | tomcat | 6.0.39 |
| apache | tomcat | 6.0.41 |
| apache | tomcat | 6.0.43 |
| apache | tomcat | 6.0.44 |
| apache | tomcat | 7.0.0:beta |
| apache | tomcat | 7.0.2:beta |
| apache | tomcat | 7.0.4:beta |
| apache | tomcat | 7.0.5:beta |
| apache | tomcat | 7.0.6 |
| apache | tomcat | 7.0.10 |
| apache | tomcat | 7.0.11 |
| apache | tomcat | 7.0.12 |
| apache | tomcat | 7.0.14 |
| apache | tomcat | 7.0.16 |
| apache | tomcat | 7.0.19 |
| apache | tomcat | 7.0.20 |
| apache | tomcat | 7.0.21 |
| apache | tomcat | 7.0.22 |
| apache | tomcat | 7.0.23 |
| apache | tomcat | 7.0.25 |
| apache | tomcat | 7.0.26 |
| apache | tomcat | 7.0.27 |
| apache | tomcat | 7.0.28 |
| apache | tomcat | 7.0.29 |
| apache | tomcat | 7.0.30 |
| apache | tomcat | 7.0.32 |
| apache | tomcat | 7.0.33 |
| apache | tomcat | 7.0.34 |
| apache | tomcat | 7.0.35 |
| apache | tomcat | 7.0.37 |
| apache | tomcat | 7.0.39 |
| apache | tomcat | 7.0.40 |
| apache | tomcat | 7.0.41 |
| apache | tomcat | 7.0.42 |
| apache | tomcat | 7.0.47 |
| apache | tomcat | 7.0.50 |
| apache | tomcat | 7.0.52 |
| apache | tomcat | 7.0.53 |
| apache | tomcat | 7.0.54 |
| apache | tomcat | 7.0.55 |
| apache | tomcat | 7.0.56 |
| apache | tomcat | 7.0.57 |
| apache | tomcat | 7.0.59 |
| apache | tomcat | 7.0.61 |
| apache | tomcat | 7.0.62 |
| apache | tomcat | 7.0.63 |
| apache | tomcat | 7.0.64 |
| apache | tomcat | 7.0.65 |
| apache | tomcat | 7.0.67 |
| apache | tomcat | 8.0.0:rc1 |
| apache | tomcat | 8.0.0:rc10 |
| apache | tomcat | 8.0.0:rc3 |
| apache | tomcat | 8.0.0:rc5 |
| apache | tomcat | 8.0.1 |
| apache | tomcat | 8.0.3 |
| apache | tomcat | 8.0.11 |
| apache | tomcat | 8.0.12 |
| apache | tomcat | 8.0.14 |
| apache | tomcat | 8.0.15 |
| apache | tomcat | 8.0.17 |
| apache | tomcat | 8.0.18 |
| apache | tomcat | 8.0.20 |
| apache | tomcat | 8.0.21 |
| apache | tomcat | 8.0.22 |
| apache | tomcat | 8.0.23 |
| apache | tomcat | 8.0.24 |
| apache | tomcat | 8.0.26 |
| apache | tomcat | 8.0.27 |
| apache | tomcat | 8.0.28 |
| apache | tomcat | 8.0.29 |
| apache | tomcat | 8.0.30 |
| apache | tomcat | 9.0.0:milestone1 |
| debian | debian_linux | 7.0 |
| debian | debian_linux | 8.0 |
| canonical | ubuntu_linux | 12.04 |
| canonical | ubuntu_linux | 14.04 |
| canonical | ubuntu_linux | 15.10 |
| canonical | ubuntu_linux | 16.04 |
𝑥
= Vulnerable software versions
Debian Releases
Ubuntu Releases
Ubuntu Product | |||||||||||||||||
|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
| tomcat6 |
| ||||||||||||||||
| tomcat7 |
| ||||||||||||||||
| tomcat8 |
|
Common Weakness Enumeration
References