Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

nvd логотип

CVE-2007-3385

Опубликовано: 14 авг. 2007
Источник: nvd
CVSS2: 4.3
EPSS Средний

Описание

Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the " character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.

Уязвимые конфигурации

Конфигурация 1

Одно из

cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*

EPSS

Процентиль: 99%
0.69407
Средний

4.3 Medium

CVSS2

Дефекты

CWE-200

Связанные уязвимости

ubuntu
почти 18 лет назад

Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.

redhat
почти 18 лет назад

Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.

debian
почти 18 лет назад

Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 ...

github
около 3 лет назад

Apache Tomcat Mishandles Character Sequence in Cookies

oracle-oval
больше 17 лет назад

ELSA-2007-0871: Moderate: tomcat security update (MODERATE)

EPSS

Процентиль: 99%
0.69407
Средний

4.3 Medium

CVSS2

Дефекты

CWE-200