Description
The session-persistence implementation in Apache Tomcat 6.x before 6.0.45, 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M2 mishandles session attributes, which allows remote authenticated users to bypass intended SecurityManager restrictions and execute arbitrary code in a privileged context via a web application that places a crafted object in a session.
Mitigation
We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
Workaround:
A potential workaround is to disable session persistence for all hosted web applications. To determine how this is done, please reference the following link.
[https://tomcat.apache.org/tomcat-7.0-doc/config/manager.html#Disable_Session_Persistence](https://tomcat.apache.org/tomcat-7.0-doc/config/manager.html#Disable_Session_Persistence)