Description
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Remediation
References
Related Vulnerabilities
Moodle URL Redirection to Untrusted Site ('Open Redirect') Vulnerability (CVE-2022-35652)
Chamilo Improper Privilege Management Vulnerability (CVE-2022-27421)
WordPress Plugin Japanized For WooCommerce Cross-Site Scripting (2.5.4)
MySQL CVE-2019-2982 Vulnerability (CVE-2019-2982)
WordPress Cookie Data PHP Code Injection Vulnerability (1.5 - 1.5.1.3)