Lucene search

K
tomcatApache TomcatTOMCAT:D6AA2626932E716C44A021C657A15F47
HistoryJan 07, 2008 - 12:00 a.m.

Fixed in Apache Tomcat 4.1.39

2008-01-0700:00:00
Apache Tomcat
tomcat.apache.org
10

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.029 Low

EPSS

Percentile

90.6%

Moderate: Session hi-jacking CVE-2008-0128

When using the SingleSignOn Valve via https the Cookie JSESSIONIDSSO is transmitted without the “secure” attribute, resulting in it being transmitted to any content that is - by purpose or error - requested via http from the same server.

This was fixed in revision 684900.

Affects: 4.1.0-4.1.37

Low: Cross-site scripting CVE-2008-1232

The message argument of HttpServletResponse.sendError() call is not only displayed on the error page, but is also used for the reason-phrase of HTTP response. This may include characters that are illegal in HTTP headers. It is possible for a specially crafted message to result in arbitrary content being injected into the HTTP response. For a successful XSS attack, unfiltered user supplied data must be included in the message argument.

This was fixed in revision 680947.

Affects: 4.1.0-4.1.37

Important: Information disclosure CVE-2008-2370

When using a RequestDispatcher the target path was normalised before the query string was removed. A request that included a specially crafted request parameter could be used to access content that would otherwise be protected by a security constraint or by locating it in under the WEB-INF directory.

This was fixed in revision 680950.

Affects: 4.1.0-4.1.37

CPENameOperatorVersion
apache tomcatge4.1.0
apache tomcatle4.1.37

5 Medium

CVSS2

Access Vector

NETWORK

Access Complexity

LOW

Authentication

NONE

Confidentiality Impact

PARTIAL

Integrity Impact

NONE

Availability Impact

NONE

AV:N/AC:L/Au:N/C:P/I:N/A:N

0.029 Low

EPSS

Percentile

90.6%