Lucene search

K
f5F5F5:K58084500
HistoryMar 05, 2018 - 12:00 a.m.

K58084500 : Apache Tomcat 6.x vulnerabilities CVE-2016-0714

2018-03-0500:00:00
my.f5.com
64

AI Score

8.2

Confidence

High

EPSS

0.008

Percentile

81.7%

Security Advisory Description

The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session. (CVE-2016-0714)

Impact

A remote authenticated user may bypass the intended security manager restrictions and execute arbitrary code in a privileged context by exploiting this vulnerability via a web application that places a crafted object in a session.

  • BIG-IP/Enterprise Manager

BIG-IP and Enterprise Manager systems do not use the affected feature. The vulnerable software is present; however, the software is not used in a way that exposes this vulnerability.

  • Traffix SDC

Exploitation of this vulnerability may occur if an attacker has access to the local network of the system; the Tomcat service is accessible only from the internal network.