Improper Access Control in Apache Tomcat
High severity
GitHub Reviewed
Published
May 14, 2022
to the GitHub Advisory Database
•
Updated Feb 29, 2024
Package
Affected versions
= 9.0.0.M1
>= 8.0.0.RC1, < 8.0.32
>= 7.0.0, < 7.0.70
>= 6.0.0, < 6.0.46
Patched versions
9.0.0.M2
8.0.32
7.0.70
6.0.46
Description
Published by the National Vulnerability Database
Feb 25, 2016
Published to the GitHub Advisory Database
May 14, 2022
Reviewed
Jul 6, 2022
Last updated
Feb 29, 2024
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
References