Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2023-28708

Опубликовано: 22 мар. 2023
Источник: redhat
CVSS3: 4.3
EPSS Низкий

Описание

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.

Отчет

CVE-2023-28708 only potentially impacts a Tomcat configuration using a RemoteIpFilter behind a proxy or loadbalancer that sets an X-Forwarded-Proto request header with a value of https. If you do not use RemoteIpFilter in such a configuration, then the vulnerability would not have any impact on you Red Hat Satellite does not include the affected Apache Tomcat, however, Tomcat is shipped with Red Hat Enterprise Linux and consumed by the Candlepin component of Satellite. Red Hat Satellite users are therefore advised to check the impact state of Red Hat Enterprise Linux, since any necessary fixes will be distributed through the platform.

Меры по смягчению последствий

For possible impact and workaround, please refer to: https://access.redhat.com/solutions/7004796

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat Enterprise Linux 6tomcat6Out of support scope
Red Hat Enterprise Linux 7tomcatWill not fix
Red Hat Enterprise Linux 8pki-deps:10.6/pki-servlet-engineWill not fix
Red Hat Enterprise Linux 9pki-servlet-engineAffected
Red Hat JBoss Web Server 3tomcat7Will not fix
Red Hat JBoss Web Server 3tomcat8Will not fix
JWS 5.7.4 releasejws5-tomcatFixedRHSA-2023:491004.09.2023
Red Hat Enterprise Linux 8tomcatFixedRHSA-2023:706514.11.2023
Red Hat Enterprise Linux 9tomcatFixedRHSA-2023:657007.11.2023
Red Hat JBoss Web Server 5.7 on RHEL 7jws5-tomcatFixedRHSA-2023:490904.09.2023

Показывать по

Дополнительная информация

Статус:

Moderate
Дефект:
CWE-200
https://bugzilla.redhat.com/show_bug.cgi?id=2180856tomcat: not including the secure attribute causes information disclosure

EPSS

Процентиль: 36%
0.00148
Низкий

4.3 Medium

CVSS3

Связанные уязвимости

CVSS3: 4.3
ubuntu
больше 2 лет назад

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.

CVSS3: 4.3
nvd
больше 2 лет назад

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.

CVSS3: 4.3
debian
больше 2 лет назад

When using the RemoteIpFilter with requests received from a reverse ...

suse-cvrf
около 2 лет назад

Security update for tomcat

suse-cvrf
около 2 лет назад

Security update for tomcat

EPSS

Процентиль: 36%
0.00148
Низкий

4.3 Medium

CVSS3