BIT-tomcat-2023-28708

See a problem?
Import Source
https://github.com/bitnami/vulndb/tree/main/data/tomcat/BIT-tomcat-2023-28708.json
JSON Data
https://api.osv.dev/v1/vulns/BIT-tomcat-2023-28708
Aliases
Published
2024-03-06T11:08:55.308Z
Modified
2024-03-06T11:25:28.861Z
Summary
[none]
Details

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.

References

Affected packages

Bitnami / tomcat

Package

Name
tomcat
Purl
pkg:bitnami/tomcat

Severity

  • 4.3 (Medium) CVSS_V3 - CVSS:3.1/AV:N/AC:L/PR:N/UI:R/S:U/C:L/I:N/A:N CVSS Calculator

Affected ranges

Type
SEMVER
Events
Introduced
8.5.0
Fixed
8.5.86
Introduced
9.0.0
Fixed
9.0.72
Introduced
10.1.0
Fixed
10.1.6
Type
SEMVER
Events
Introduced
11.0.0-milestone1
Last affected
11.0.0-milestone1
Introduced
11.0.0-milestone2
Last affected
11.0.0-milestone2