Описание
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
A session fixation flaw was found in the way Tomcat recycled the requestedSessionSSL field. If at least one web application was configured to use the SSL session ID as the HTTP session ID, an attacker could reuse a previously used session ID for further requests.
Затронутые пакеты
Платформа | Пакет | Состояние | Рекомендация | Релиз |
---|---|---|---|---|
Red Hat Enterprise Linux 6 | tomcat6 | Not affected | ||
Red Hat JBoss BRMS 5 | jbossweb | Will not fix | ||
Red Hat JBoss Data Grid 6 | jbossweb | Affected | ||
Red Hat JBoss Enterprise Application Platform 4 | jbossweb | Will not fix | ||
Red Hat JBoss Enterprise Application Platform 5 | jbossweb | Will not fix | ||
Red Hat JBoss Enterprise Application Platform 6 | jbossweb | Affected | ||
Red Hat JBoss Fuse Service Works 6 | jbossweb | Will not fix | ||
Red Hat JBoss Operations Network 3 | jbossweb | Affected | ||
Red Hat JBoss Portal 6 | jbossweb | Affected | ||
Red Hat JBoss SOA Platform 5 | jbossweb | Will not fix |
Показывать по
Дополнительная информация
Статус:
EPSS
8.1 High
CVSS3
6.8 Medium
CVSS2
Связанные уязвимости
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x before 8.0.30, and 9.x before 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote attackers to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.
Session fixation vulnerability in Apache Tomcat 7.x before 7.0.66, 8.x ...
Improper Neutralization of Input During Web Page Generation in Apache Tomcat
Уязвимость сервера приложений Apache Tomcat, позволяющая нарушителю получить доступ к веб-сессиям
EPSS
8.1 High
CVSS3
6.8 Medium
CVSS2