Apache Tomcat fails to properly handle cookies that contain a single quote, which may allow session hijacking.
Apache Tomcat is an implementation of the Java Servlet and JavaServer Page (JSP) technologies. Apache Tomcat incorrectly treats a single quote as a cookie delimiter. This can cause the Tomcat cookie parsing mechanism to improperly handle all of the cookies in the cookie string that follow the cookie with the single quote. According to the vendor, the following versions of Apache Tomcat are affected
6.0.0 to 6.0.13
5.5.0 to 5.5.24
5.0.0 to 5.0.30
4.1.0 to 4.1.36
3.3 to 3.3.2
This vulnerability can increase the possibility of a session hijacking success. In the presense of a cross-site scripting vulnerability, it may allow a denial-of-service attack against a web site by preventing a client from being able to log in using cookies.
Apply an update
This vulnerability is addressed in Apache Tomcat 6.0.14. Please check the Apache Tomcat Security page for availability of fixes for this and other versions of Tomcat.
Vendor| Status| Date Notified| Date Updated
Apache Tomcat| | 02 Jul 2007| 14 Aug 2007
If you are a vendor and your product is affected, let us know.
Group | Score | Vector
Base | N/A | N/A
Temporal | N/A | N/A
Environmental | N/A | N/A
Thanks to Tomasz Kuczynski for reporting this vulnerability.
This document was written by Will Dormann.