When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
OS | Version | Architecture | Package | Version | Filename |
---|---|---|---|---|---|
Debian | 12 | all | tomcat10 | < 10.1.6-1 | tomcat10_10.1.6-1_all.deb |
Debian | 999 | all | tomcat10 | < 10.1.6-1 | tomcat10_10.1.6-1_all.deb |
Debian | 13 | all | tomcat10 | < 10.1.6-1 | tomcat10_10.1.6-1_all.deb |
Debian | 12 | all | tomcat9 | < 9.0.70-2 | tomcat9_9.0.70-2_all.deb |
Debian | 11 | all | tomcat9 | < 9.0.43-2~deb11u6 | tomcat9_9.0.43-2~deb11u6_all.deb |
Debian | 10 | all | tomcat9 | < 9.0.31-1~deb10u8 | tomcat9_9.0.31-1~deb10u8_all.deb |
Debian | 999 | all | tomcat9 | < 9.0.70-2 | tomcat9_9.0.70-2_all.deb |
Debian | 13 | all | tomcat9 | < 9.0.70-2 | tomcat9_9.0.70-2_all.deb |