Описание
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
Релиз | Статус | Примечание |
---|---|---|
bionic | DNE | |
devel | not-affected | 10.1.40-1 |
esm-apps/noble | not-affected | 10.1.16-1ubuntu0.1~esm2 |
esm-infra/focal | DNE | |
focal | DNE | |
jammy | DNE | |
kinetic | DNE | |
lunar | ignored | end of life, was needs-triage |
mantic | ignored | end of life, was needs-triage |
noble | not-affected | 10.1.16-1 |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
esm-apps/bionic | released | 8.5.39-1ubuntu1~18.04.3+esm5 |
esm-infra/focal | DNE | |
esm-infra/xenial | needs-triage | |
focal | DNE | |
jammy | DNE | |
kinetic | DNE | |
trusty | ignored | end of standard support |
upstream | needs-triage | |
xenial | ignored | end of standard support |
Показывать по
Релиз | Статус | Примечание |
---|---|---|
bionic | ignored | end of standard support, was needs-triage |
devel | released | 9.0.70-2ubuntu3 |
esm-apps/bionic | released | 9.0.16-3ubuntu0.18.04.2+esm4 |
esm-apps/focal | released | 9.0.31-1ubuntu0.8 |
esm-apps/jammy | released | 9.0.58-1ubuntu0.1+esm4 |
esm-apps/noble | released | 9.0.70-2ubuntu0.1+esm2 |
focal | released | 9.0.31-1ubuntu0.8 |
jammy | needed | |
kinetic | ignored | end of life, was needs-triage |
lunar | ignored | end of life, was needs-triage |
Показывать по
4.3 Medium
CVSS3
Связанные уязвимости
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
When using the RemoteIpFilter with requests received from a reverse ...
4.3 Medium
CVSS3