The setGlobalContext method in org/apache/naming/factory/ResourceLinkFactory.java in Apache Tomcat 7.x before 7.0.68, 8.x before 8.0.31, and 9.x before 9.0.0.M3 does not consider whether ResourceLinkFactory.setGlobalContext callers are authorized, which allows remote authenticated users to bypass intended SecurityManager restrictions and read or write to arbitrary application data, or cause a denial of service (application disruption), via a web application that sets a crafted global context.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-05T22:30:04.044Z
Reserved: 2015-12-16T00:00:00
Link: CVE-2016-0763

No data.

Status : Modified
Published: 2016-02-25T01:59:06.280
Modified: 2024-11-21T02:42:19.920
Link: CVE-2016-0763
