Description
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Remediation
References
Related Vulnerabilities
Apache Tomcat Improper Input Validation Vulnerability (CVE-2014-0033)
MySQL CVE-2014-2484 Vulnerability (CVE-2014-2484)
Apache HTTP Server NULL Pointer Dereference Vulnerability (CVE-2020-13950)
WordPress Plugin Improved Sale Badges for WooCommerce Security Bypass (4.3.2)
WordPress Plugin Downloads Manager 'upload.php' Arbitrary File Upload (0.2)