Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

debian логотип

CVE-2008-0128

Опубликовано: 23 янв. 2008
Источник: debian
EPSS Низкий

Описание

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

Пакеты

ПакетСтатусВерсия исправленияРелизТип
tomcat5removedpackage
tomcat5.5fixed5.5.23-1package

Примечания

  • SSO cookies not working in 5.0, have only been fixed in 5.5.13, see #34724

  • SSO cookies sent over secure connections do not require

  • secure connections, possibly defeating HTTPS encryption.

  • See: http://issues.apache.org/bugzilla/show_bug.cgi?id=41217

EPSS

Процентиль: 86%
0.02898
Низкий

Связанные уязвимости

ubuntu
больше 17 лет назад

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

redhat
больше 18 лет назад

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

nvd
больше 17 лет назад

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

github
больше 3 лет назад

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.

EPSS

Процентиль: 86%
0.02898
Низкий