6.5
CVSSv2

CVE-2016-0714

Published: 25/02/2016 Updated: 15/04/2019
CVSS v2 Base Score: 6.5 | Impact Score: 6.4 | Exploitability Score: 8
CVSS v3 Base Score: 8.8 | Impact Score: 5.9 | Exploitability Score: 2.8
VMScore: 578
Vector: AV:N/AC:L/Au:S/C:P/I:P/A:P

Vulnerability Summary

The session-persistence implementation in Apache Tomcat 6.x prior to 6.0.45, 7.x prior to 7.0.68, 8.x prior to 8.0.31, and 9.x prior to 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 8.0.29

apache tomcat 8.0.28

apache tomcat 8.0.20

apache tomcat 8.0.18

apache tomcat 8.0.0

apache tomcat 7.0.6

apache tomcat 7.0.59

apache tomcat 7.0.5

apache tomcat 7.0.47

apache tomcat 7.0.35

apache tomcat 7.0.34

apache tomcat 7.0.26

apache tomcat 7.0.25

apache tomcat 7.0.23

apache tomcat 7.0.14

apache tomcat 7.0.12

apache tomcat 6.0.4

apache tomcat 6.0.29

apache tomcat 8.0.27

apache tomcat 9.0.0

apache tomcat 8.0.17

apache tomcat 8.0.15

apache tomcat 7.0.57

apache tomcat 7.0.56

apache tomcat 7.0.55

apache tomcat 7.0.42

apache tomcat 7.0.41

apache tomcat 7.0.33

apache tomcat 7.0.32

apache tomcat 7.0.22

apache tomcat 7.0.21

apache tomcat 7.0.11

apache tomcat 7.0.10

apache tomcat 6.0.39

apache tomcat 6.0.37

apache tomcat 6.0.26

apache tomcat 6.0.24

apache tomcat 6.0.14

apache tomcat 6.0.13

apache tomcat 8.0.30

apache tomcat 8.0.3

apache tomcat 8.0.22

apache tomcat 8.0.21

apache tomcat 8.0.11

apache tomcat 8.0.1

apache tomcat 7.0.62

apache tomcat 7.0.61

apache tomcat 7.0.52

apache tomcat 7.0.50

apache tomcat 7.0.39

apache tomcat 7.0.37

apache tomcat 7.0.28

apache tomcat 7.0.27

apache tomcat 7.0.19

apache tomcat 7.0.16

apache tomcat 6.0.43

apache tomcat 6.0.41

apache tomcat 6.0.33

apache tomcat 6.0.32

apache tomcat 6.0.30

apache tomcat 6.0.2

apache tomcat 6.0.1

apache tomcat 6.0.28

apache tomcat 6.0.18

apache tomcat 6.0.16

apache tomcat 6.0.0

apache tomcat 7.0.67

apache tomcat 7.0.65

apache tomcat 8.0.26

apache tomcat 8.0.24

apache tomcat 8.0.23

apache tomcat 8.0.14

apache tomcat 8.0.12

apache tomcat 7.0.64

apache tomcat 7.0.63

apache tomcat 7.0.54

apache tomcat 7.0.53

apache tomcat 7.0.40

apache tomcat 7.0.4

apache tomcat 7.0.30

apache tomcat 7.0.29

apache tomcat 7.0.20

apache tomcat 7.0.2

apache tomcat 7.0.0

apache tomcat 6.0.44

apache tomcat 6.0.36

apache tomcat 6.0.35

apache tomcat 6.0.20

apache tomcat 6.0.11

apache tomcat 6.0.10

debian debian linux 8.0

debian debian linux 7.0

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

canonical ubuntu linux 12.04

Vendor Advisories

Synopsis Important: Red Hat JBoss Web Server 212 security update for Tomcat 7 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Web ServerRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Important: Red Hat JBoss Web Server 212 security update for Tomcat 7 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Web Server 2 for RHEL 6 and Red Hat JBoss Enterprise Web Server 2 for RHEL 7Red Hat Product Security has rated this update ...
Synopsis Important: tomcat6 security and bug fix update Type/Severity Security Advisory: Important Topic An update for tomcat6 is now available for Red Hat Enterprise Linux 6Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) ...
It was found that several Tomcat session persistence mechanisms could allow a remote, authenticated user to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that placed a crafted object in a session ...
Several security issues were fixed in Tomcat ...
ResourceLinkFactorysetGlobalContext() is a public method and was discovered to be accessible by web applications running under a security manager without any checks This allowed a malicious web application to inject a malicious global context that could in turn be used to disrupt other web applications and/or read and write data owned by other we ...
A directory traversal vulnerability in RequestUtiljava was discovered which allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a / (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call (CVE-2015-5174) The Mapper compo ...
ResourceLinkFactorysetGlobalContext() is a public method and was discovered to be accessible by web applications running under a security manager without any checks This allowed a malicious web application to inject a malicious global context that could in turn be used to disrupt other web applications and/or read and write data owned by other we ...
Multiple security vulnerabilities have been discovered in the Tomcat servlet and JSP engine, which may result in information disclosure, the bypass of CSRF protections, bypass of the SecurityManager or denial of service For the stable distribution (jessie), these problems have been fixed in version 8014-1+deb8u2 For the unstable distribution (s ...
Multiple security vulnerabilities have been discovered in the Tomcat servlet and JSP engine, which may result in information disclosure, the bypass of CSRF protections and bypass of the SecurityManager For the oldstable distribution (wheezy), these problems have been fixed in version 7028-4+deb7u4 This update also fixes CVE-2014-0119 and CVE-20 ...
<!-- Start - Changes for Security Advisory Channel --> Security Advisory ID SYMSA1353 Initial Publication Date: Advisory Status: Advisory Severity: CVSS Base Score: Legacy ID 15 Mar 2016 Open Medium CVSS v2: 68 SA1 ...
Oracle Critical Patch Update Advisory - January 2017 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory Th ...
Oracle Solaris Third Party Bulletin - January 2016 Description The Oracle Solaris Third Party Bulletin announces patches for one or more security vulnerabilities fixed in third party software that is included in Oracle Solaris distributions Starting January 20, 2015, Third Party Bulletins are released on the same day when Oracle Critical Patch Up ...
Oracle Critical Patch Update Advisory - October 2016 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previou ...
Oracle Critical Patch Update Advisory - July 2018 Description A Critical Patch Update is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous C ...
Oracle Critical Patch Update Advisory - April 2017 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the previous Critical Patch Update advisory Thus ...
Oracle Critical Patch Update Advisory - October 2017 Description A Critical Patch Update (CPU) is a collection of patches for multiple security vulnerabilities Critical Patch Update patches are usually cumulative, but each advisory describes only the security fixes added since the ...
Oracle Linux Bulletin - October 2016 Description The Oracle Linux Bulletin lists all CVEs that had been resolved and announced in Oracle Linux Security Advisories (ELSA) in the last one month prior to the release of the bulletin Oracle Linux Bulletins are published on the same day as Oracle Critical ...

Github Repositories

Java-Deserialization-Cheat-Sheet A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries Please, use #javadeser hash tag for tweets Table of content Java Native Serialization (binary) Overview Main talks &amp; presentations &amp; docs Payload generators Exploits Detect Vulnerable apps (without

The cheat sheet about Java Deserialization vulnerabilities

Java-Deserialization-Cheat-Sheet A cheat sheet for pentesters and researchers about deserialization vulnerabilities in various Java (JVM) serialization libraries Please, use #javadeser hash tag for tweets Table of content Java Native Serialization (binary) Overview Main talks &amp; presentations &amp; docs Payload generators Exploits Detect Vulnerable apps (without

Compiled dataset of Java deserialization CVEs

Java-Deserialization-CVEs This is a dataset of CVEs related to Java Deserialization Since existing CVE databases do not allow for granular searches by vulnerability type and language, this list was compiled by manually searching the NIST NVD CVE database with different queries If you notice any discrepancies, contributions are very welcome! CVE ID Year CVSS 3/31 risk CV

References

CWE-264http://svn.apache.org/viewvc?view=revision&revision=1727034http://tomcat.apache.org/security-8.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1727166http://svn.apache.org/viewvc?view=revision&revision=1726196http://seclists.org/bugtraq/2016/Feb/145http://svn.apache.org/viewvc?view=revision&revision=1725263http://svn.apache.org/viewvc?view=revision&revision=1726203http://svn.apache.org/viewvc?view=revision&revision=1725914http://tomcat.apache.org/security-6.htmlhttp://tomcat.apache.org/security-9.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1727182http://tomcat.apache.org/security-7.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1726923http://www.debian.org/security/2016/dsa-3530https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442http://www.debian.org/security/2016/dsa-3609http://www.ubuntu.com/usn/USN-3024-1http://www.debian.org/security/2016/dsa-3552https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964http://marc.info/?l=bugtraq&m=145974991225029&w=2http://rhn.redhat.com/errata/RHSA-2016-2045.htmlhttp://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.htmlhttp://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlhttp://www.securityfocus.com/bid/83327https://access.redhat.com/errata/RHSA-2016:1087http://rhn.redhat.com/errata/RHSA-2016-1089.htmlhttps://access.redhat.com/errata/RHSA-2016:1088http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.htmlhttps://bto.bluecoat.com/security-advisory/sa118http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.htmlhttp://www.securitytracker.com/id/1035069https://security.gentoo.org/glsa/201705-09http://www.securitytracker.com/id/1037640http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2808.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2807.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2599.htmlhttps://security.netapp.com/advisory/ntap-20180531-0001/http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttps://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3Ehttp://tools.cisco.com/security/center/viewAlert.x?alertId=43692https://nvd.nist.govhttps://usn.ubuntu.com/3024-1/