Lucene search

K
tomcatApache TomcatTOMCAT:EE149038DCD9C346AD647A932FC900D5
HistoryFeb 24, 2023 - 12:00 a.m.

Fixed in Apache Tomcat 8.5.86

2023-02-2400:00:00
Apache Tomcat
tomcat.apache.org
46
apache tomcat
information disclosure
remoteipfilter
x-forwarded-proto
security attribute
session cookies
insecure channel

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

40.1%

Important: Apache Tomcat information disclosure CVE-2023-28708

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Tomcat did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.

This was fixed with commit 5b72c94e.

66471 was reported publicly on 8 February 2023. The security implications were identified by the Tomcat Security team on 9 February 2023. The issue was made public on 22 March 2023.

Affects: 8.5.0 to 8.5.85

CPENameOperatorVersion
apache tomcatge8.5.0
apache tomcatle8.5.85

4.3 Medium

CVSS3

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

REQUIRED

Scope

UNCHANGED

Confidentiality Impact

LOW

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N

0.001 Low

EPSS

Percentile

40.1%