A malicious web application running on Apache Tomcat 9.0.0.M1 to 9.0.0.M9, 8.5.0 to 8.5.4, 8.0.0.RC1 to 8.0.36, 7.0.0 to 7.0.70 and 6.0.0 to 6.0.45 was able to bypass a configured SecurityManager via manipulation of the configuration parameters for the JSP Servlet.
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "tomcat7-examples": "7.0.52-1ubuntu0.8", "tomcat7-admin": "7.0.52-1ubuntu0.8", "tomcat7-user": "7.0.52-1ubuntu0.8", "libservlet3.0-java": "7.0.52-1ubuntu0.8", "libservlet3.0-java-doc": "7.0.52-1ubuntu0.8", "libtomcat7-java": "7.0.52-1ubuntu0.8", "tomcat7-docs": "7.0.52-1ubuntu0.8", "tomcat7": "7.0.52-1ubuntu0.8", "tomcat7-common": "7.0.52-1ubuntu0.8" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "tomcat7-examples": "7.0.68-1ubuntu0.3", "tomcat7-admin": "7.0.68-1ubuntu0.3", "tomcat7-user": "7.0.68-1ubuntu0.3", "libservlet3.0-java": "7.0.68-1ubuntu0.3", "libservlet3.0-java-doc": "7.0.68-1ubuntu0.3", "libtomcat7-java": "7.0.68-1ubuntu0.3", "tomcat7-docs": "7.0.68-1ubuntu0.3", "tomcat7": "7.0.68-1ubuntu0.3", "tomcat7-common": "7.0.68-1ubuntu0.3" } ] }
{ "availability": "No subscription required", "ubuntu_priority": "low", "binaries": [ { "tomcat8-common": "8.0.32-1ubuntu1.3", "tomcat8-admin": "8.0.32-1ubuntu1.3", "tomcat8-user": "8.0.32-1ubuntu1.3", "libtomcat8-java": "8.0.32-1ubuntu1.3", "tomcat8": "8.0.32-1ubuntu1.3", "tomcat8-examples": "8.0.32-1ubuntu1.3", "libservlet3.1-java-doc": "8.0.32-1ubuntu1.3", "libservlet3.1-java": "8.0.32-1ubuntu1.3", "tomcat8-docs": "8.0.32-1ubuntu1.3" } ] }