When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
{
"unresolved_ranges": [
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:agile_engineering_data_management:6.2.1.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "6.2.1.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:hyperion_infrastructure_technology:11.1.2.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "11.1.2.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:instantis_enterprisetrack:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"introduced": "17.1"
},
{
"last_affected": "17.3"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:micros_relate_crm_software:11.4:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "11.4"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:mysql_enterprise_monitor:*:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "4.0.11.5331"
},
{
"introduced": "8.0.0"
},
{
"last_affected": "8.0.18.1217"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:retail_order_broker:15.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "15.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:a:oracle:transportation_management:6.3.7:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "6.3.7"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:canonical:ubuntu_linux:16.04:*:*:*:lts:*:*:*",
"extracted_events": [
{
"last_affected": "16.04"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:debian:debian_linux:8.0:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "8.0"
}
]
},
{
"source": "CPE_FIELD",
"cpe": "cpe:2.3:o:opensuse:leap:15.1:*:*:*:*:*:*:*",
"extracted_events": [
{
"last_affected": "15.1"
}
]
}
]
}{
"source": "CPE_FIELD",
"cpe": [
"cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:9.0:*:*:*:*:*:*:*",
"cpe:2.3:o:debian:debian_linux:10.0:*:*:*:*:*:*:*"
],
"extracted_events": [
{
"introduced": "7.0.0"
},
{
"last_affected": "7.0.98"
},
{
"introduced": "8.5.0"
},
{
"last_affected": "8.5.49"
},
{
"introduced": "9.0.0"
},
{
"last_affected": "9.0.29"
},
{
"introduced": "0"
},
{
"last_affected": "9.0"
},
{
"last_affected": "10.0"
}
]
}