{"id":"CVE-2016-0714","details":"The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.","aliases":["GHSA-mv42-px54-87jw"],"modified":"2026-04-16T06:16:32.983600014Z","published":"2016-02-25T01:59:05.263Z","related":["SUSE-SU-2016:0769-1","SUSE-SU-2016:0822-1","SUSE-SU-2016:0839-1","openSUSE-SU-2024:10446-1","openSUSE-SU-2024:13441-1"],"references":[{"type":"WEB","url":"http://marc.info/?l=bugtraq&m=145974991225029&w=2"},{"type":"WEB","url":"http://seclists.org/bugtraq/2016/Feb/145"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05054964"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.html"},{"type":"WEB","url":"http://svn.apache.org/viewvc?view=revision&revision=1727166"},{"type":"WEB","url":"http://www.securitytracker.com/id/1037640"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.html"},{"type":"WEB","url":"http://www.securityfocus.com/bid/83327"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442"},{"type":"WEB","url":"http://svn.apache.org/viewvc?view=revision&revision=1725263"},{"type":"WEB","url":"http://svn.apache.org/viewvc?view=revision&revision=1725914"},{"type":"WEB","url":"http://svn.apache.org/viewvc?view=revision&revision=1727182"},{"type":"WEB","url":"https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"http://svn.apache.org/viewvc?view=revision&revision=1727034"},{"type":"WEB","url":"http://www.oracle.com/technetwork/topics/security/bulletinapr2016-2952098.html"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.html"},{"type":"WEB","url":"https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626"},{"type":"WEB","url":"https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"http://svn.apache.org/viewvc?view=revision&revision=1726196"},{"type":"WEB","url":"http://svn.apache.org/viewvc?view=revision&revision=1726203"},{"type":"WEB","url":"http://svn.apache.org/viewvc?view=revision&revision=1726923"},{"type":"WEB","url":"http://www.securitytracker.com/id/1035069"},{"type":"WEB","url":"https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00082.html"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E"},{"type":"WEB","url":"https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2808.html"},{"type":"ADVISORY","url":"http://tomcat.apache.org/security-6.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-1089.html"},{"type":"ADVISORY","url":"https://bto.bluecoat.com/security-advisory/sa118"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3530"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2016-2881722.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpuoct2017-3236626.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1088"},{"type":"ADVISORY","url":"http://tomcat.apache.org/security-7.html"},{"type":"ADVISORY","url":"http://tomcat.apache.org/security-8.html"},{"type":"ADVISORY","url":"https://security.gentoo.org/glsa/201705-09"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2045.html"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2599.html"},{"type":"ADVISORY","url":"http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.html"},{"type":"ADVISORY","url":"http://www.ubuntu.com/usn/USN-3024-1"},{"type":"ADVISORY","url":"http://tomcat.apache.org/security-9.html"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3552"},{"type":"ADVISORY","url":"http://www.debian.org/security/2016/dsa-3609"},{"type":"ADVISORY","url":"http://rhn.redhat.com/errata/RHSA-2016-2807.html"},{"type":"ADVISORY","url":"https://access.redhat.com/errata/RHSA-2016:1087"},{"type":"ADVISORY","url":"https://security.netapp.com/advisory/ntap-20180531-0001/"}],"affected":[{"ranges":[{"type":"GIT","repo":"https://github.com/apache/tomcat","events":[{"introduced":"0"},{"last_affected":"4a39288c6eab999452c72af9fd1a0c12b054ca9f"},{"introduced":"0"},{"last_affected":"8b83cefaf2a454706f03f509944ca46103db4d13"},{"introduced":"0"},{"last_affected":"85cfeb746b8ea0d0e51cc4ced6053075f5460a36"},{"introduced":"0"},{"last_affected":"de47b464201769870a06764cdd5143a59cd95302"},{"introduced":"0"},{"last_affected":"c845090723d1118dbce1928f9468e1726b79c3b1"},{"introduced":"0"},{"last_affected":"9e0d31f12dbd5441097dbec493895ad4e07a6832"},{"introduced":"0"},{"last_affected":"892c777b9d5c051dc20aacfefc280ab02dbe2143"},{"introduced":"0"},{"last_affected":"eae5ead3864c4e2d528a874069828c6c12dee8a5"},{"introduced":"0"},{"last_affected":"ddd8de1c64ef852caca10ab876fed02cfe827ef1"},{"introduced":"0"},{"last_affected":"6e2c7f6227de95874c79f77bafe5ed26dfeb4021"},{"introduced":"0"},{"last_affected":"9f62bc56a0887353e58579153a30c64c5369efdb"},{"introduced":"0"},{"last_affected":"009cf0448025b6227b026e66f5351f0dcb3dd733"},{"introduced":"0"},{"last_affected":"68e114cf9fe0a83a888099c084b3036040afa518"},{"introduced":"0"},{"last_affected":"efa0e79f82f17880c0d7427918bc34a83243dfa6"},{"introduced":"0"},{"last_affected":"5e096bfd5a387f057766dc6b5217feae75b08331"},{"introduced":"0"},{"last_affected":"b7b373b84f1b80602ed62fb056be7c7ce429a15c"},{"introduced":"0"},{"last_affected":"86ecd2ad87b805992b9e4c2f2317feaab7a1e3fb"},{"introduced":"0"},{"last_affected":"7cfeba335a41dd3b0e423f12534e5936c461711c"},{"introduced":"0"},{"last_affected":"ba53773f48f31de787edb559db38e3e02d7efffd"},{"introduced":"0"},{"last_affected":"7e8629b4ff4152ae6285fa184745e9a1382ca440"},{"introduced":"0"},{"last_affected":"fec4a6d1d1f050401aec5c6a3bd0431850472d92"},{"introduced":"0"},{"last_affected":"3477614af783b612341fa6bc00c16b32d1791de8"},{"introduced":"0"},{"last_affected":"5f6f258107e7e463cce41187e13474f3c894693e"},{"introduced":"0"},{"last_affected":"2b858c0fce0db18ca733b161d7428f2cca214841"},{"introduced":"0"},{"last_affected":"1958059057715d26415839cabad78e685d4d02f1"},{"introduced":"0"},{"last_affected":"ad3da1182b0ed370ec233b925c69dcee826a9efe"},{"introduced":"0"},{"last_affected":"81d3e54a46de226a5a8f11bcc65195cddcc24f96"},{"introduced":"0"},{"last_affected":"d70fcee0390d1a82b108979d26a7a397a7418bc7"},{"introduced":"0"},{"last_affected":"1b734919fd5ee83a2905070dcbd6ffffff1beb63"},{"introduced":"0"},{"last_affected":"32583ea28061391c314a09a43fbee48c072940a9"},{"introduced":"0"},{"last_affected":"b7d6e626d03f61ccd6c92e8ea28df12e67d256e6"},{"introduced":"0"},{"last_affected":"47af1012111595546f31d9096a37a839f93caa62"},{"introduced":"0"},{"last_affected":"feaf3763fb37e4a9176ef46a2c80e34821077884"},{"introduced":"0"},{"last_affected":"30a7e7f7b48aa5f9f4a559635966d70901b5f51d"},{"introduced":"0"},{"last_affected":"be7e6137267298d6a7b1b3cd2cb1f3f605f9162b"},{"introduced":"0"},{"last_affected":"8d84136656655a20287cf2dac6ec7fd047979de5"},{"introduced":"0"},{"last_affected":"20bd21830dfe7864cac78acb1b7c825baa11bd85"},{"introduced":"0"},{"last_affected":"6b77b128188a5ed033da2998ff2f47f65aa4f7f8"},{"introduced":"0"},{"last_affected":"f6de6eb5445d266506fcf89d3962a622478c2c6c"},{"introduced":"0"},{"last_affected":"a6d2ed3eef40903b661d138ae7c8fbd9790d1928"},{"introduced":"0"},{"last_affected":"05e76dc1b6edcc2fa87d95de72a8a714267e462d"},{"introduced":"0"},{"last_affected":"29b07def810d335012e738b22ab44d4e232b50d1"},{"introduced":"0"},{"last_affected":"e498667bd7811e846771a852b16ce9f1e524b81b"}],"database_specific":{"versions":[{"introduced":"0"},{"last_affected":"7.0.6"},{"introduced":"0"},{"last_affected":"7.0.10"},{"introduced":"0"},{"last_affected":"7.0.11"},{"introduced":"0"},{"last_affected":"7.0.12"},{"introduced":"0"},{"last_affected":"7.0.14"},{"introduced":"0"},{"last_affected":"7.0.16"},{"introduced":"0"},{"last_affected":"7.0.19"},{"introduced":"0"},{"last_affected":"7.0.20"},{"introduced":"0"},{"last_affected":"7.0.21"},{"introduced":"0"},{"last_affected":"7.0.22"},{"introduced":"0"},{"last_affected":"7.0.23"},{"introduced":"0"},{"last_affected":"7.0.25"},{"introduced":"0"},{"last_affected":"7.0.26"},{"introduced":"0"},{"last_affected":"7.0.27"},{"introduced":"0"},{"last_affected":"7.0.28"},{"introduced":"0"},{"last_affected":"7.0.29"},{"introduced":"0"},{"last_affected":"7.0.30"},{"introduced":"0"},{"last_affected":"7.0.32"},{"introduced":"0"},{"last_affected":"7.0.33"},{"introduced":"0"},{"last_affected":"7.0.34"},{"introduced":"0"},{"last_affected":"7.0.35"},{"introduced":"0"},{"last_affected":"7.0.37"},{"introduced":"0"},{"last_affected":"7.0.39"},{"introduced":"0"},{"last_affected":"7.0.40"},{"introduced":"0"},{"last_affected":"7.0.41"},{"introduced":"0"},{"last_affected":"7.0.42"},{"introduced":"0"},{"last_affected":"7.0.47"},{"introduced":"0"},{"last_affected":"7.0.50"},{"introduced":"0"},{"last_affected":"7.0.52"},{"introduced":"0"},{"last_affected":"7.0.53"},{"introduced":"0"},{"last_affected":"7.0.54"},{"introduced":"0"},{"last_affected":"7.0.55"},{"introduced":"0"},{"last_affected":"7.0.56"},{"introduced":"0"},{"last_affected":"7.0.57"},{"introduced":"0"},{"last_affected":"7.0.59"},{"introduced":"0"},{"last_affected":"7.0.61"},{"introduced":"0"},{"last_affected":"7.0.62"},{"introduced":"0"},{"last_affected":"7.0.63"},{"introduced":"0"},{"last_affected":"7.0.64"},{"introduced":"0"},{"last_affected":"7.0.65"},{"introduced":"0"},{"last_affected":"7.0.67"},{"introduced":"0"},{"last_affected":"9.0.0-milestone1"},{"introduced":"0"},{"last_affected":"7.0"}]}}],"versions":["7.0.0","7.0.10","7.0.11","7.0.12","7.0.14","7.0.16","7.0.19","7.0.20","7.0.21","7.0.22","7.0.23","7.0.25","7.0.26","7.0.27","7.0.28","7.0.29","7.0.30","7.0.32","7.0.33","7.0.34","7.0.35","7.0.37","7.0.39","7.0.40","7.0.41","7.0.42","7.0.47","7.0.50","7.0.52","7.0.53","7.0.54","7.0.55","7.0.56","7.0.57","7.0.59","7.0.6","7.0.61","7.0.62","7.0.63","7.0.64","7.0.65","7.0.67","9.0.0-M1"],"database_specific":{"unresolved_ranges":[{"events":[{"introduced":"0"},{"last_affected":"6.0.0"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.0-alpha"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.1-alpha"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.2"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.2-alpha"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.2-beta"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.4"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.4-alpha"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.10"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.11"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.13"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.14"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.16"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.18"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.20"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.24"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.26"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.28"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.29"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.30"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.32"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.33"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.35"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.36"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.37"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.39"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.41"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.43"}]},{"events":[{"introduced":"0"},{"last_affected":"6.0.44"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.0-beta"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.2-beta"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.4-beta"}]},{"events":[{"introduced":"0"},{"last_affected":"7.0.5-beta"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0-rc1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0-rc10"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0-rc3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.0-rc5"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.1"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.3"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.11"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.12"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.14"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.15"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.17"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.18"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.20"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.21"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.22"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.23"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.24"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.26"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.27"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.28"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.29"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0.30"}]},{"events":[{"introduced":"0"},{"last_affected":"8.0"}]},{"events":[{"introduced":"0"},{"last_affected":"12.04"}]},{"events":[{"introduced":"0"},{"last_affected":"14.04"}]},{"events":[{"introduced":"0"},{"last_affected":"15.10"}]},{"events":[{"introduced":"0"},{"last_affected":"16.04"}]}],"source":"https://storage.googleapis.com/cve-osv-conversion/osv-output/CVE-2016-0714.json"}}],"schema_version":"1.7.5","severity":[{"type":"CVSS_V3","score":"CVSS:3.0/AV:N/AC:L/PR:L/UI:N/S:U/C:H/I:H/A:H"}]}