CVE-2008-0128

The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
References
Link Resource
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
http://issues.apache.org/bugzilla/show_bug.cgi?id=41217 Patch
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
http://rhn.redhat.com/errata/RHSA-2008-0630.html
http://secunia.com/advisories/28549 Vendor Advisory
http://secunia.com/advisories/28552 Vendor Advisory
http://secunia.com/advisories/29242
http://secunia.com/advisories/31493
http://secunia.com/advisories/33668
http://security-tracker.debian.net/tracker/CVE-2008-0128
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
http://www.debian.org/security/2008/dsa-1468
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.securityfocus.com/archive/1/500396/100/0/threaded
http://www.securityfocus.com/archive/1/500412/100/0/threaded
http://www.securityfocus.com/bid/27365
http://www.vupen.com/english/advisories/2008/0192
http://www.vupen.com/english/advisories/2009/0233
https://exchange.xforce.ibmcloud.com/vulnerabilities/39804
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
http://issues.apache.org/bugzilla/show_bug.cgi?id=41217 Patch
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
http://rhn.redhat.com/errata/RHSA-2008-0630.html
http://secunia.com/advisories/28549 Vendor Advisory
http://secunia.com/advisories/28552 Vendor Advisory
http://secunia.com/advisories/29242
http://secunia.com/advisories/31493
http://secunia.com/advisories/33668
http://security-tracker.debian.net/tracker/CVE-2008-0128
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
http://www.debian.org/security/2008/dsa-1468
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.securityfocus.com/archive/1/500396/100/0/threaded
http://www.securityfocus.com/archive/1/500412/100/0/threaded
http://www.securityfocus.com/bid/27365
http://www.vupen.com/english/advisories/2008/0192
http://www.vupen.com/english/advisories/2009/0233
https://exchange.xforce.ibmcloud.com/vulnerabilities/39804
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
Configurations

Configuration 1 (hide)

cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*

History

21 Nov 2024, 00:41

Type Values Removed Values Added
References () http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx - () http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx -
References () http://issues.apache.org/bugzilla/show_bug.cgi?id=41217 - Patch () http://issues.apache.org/bugzilla/show_bug.cgi?id=41217 - Patch
References () http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html - () http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html -
References () http://rhn.redhat.com/errata/RHSA-2008-0630.html - () http://rhn.redhat.com/errata/RHSA-2008-0630.html -
References () http://secunia.com/advisories/28549 - Vendor Advisory () http://secunia.com/advisories/28549 - Vendor Advisory
References () http://secunia.com/advisories/28552 - Vendor Advisory () http://secunia.com/advisories/28552 - Vendor Advisory
References () http://secunia.com/advisories/29242 - () http://secunia.com/advisories/29242 -
References () http://secunia.com/advisories/31493 - () http://secunia.com/advisories/31493 -
References () http://secunia.com/advisories/33668 - () http://secunia.com/advisories/33668 -
References () http://security-tracker.debian.net/tracker/CVE-2008-0128 - () http://security-tracker.debian.net/tracker/CVE-2008-0128 -
References () http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540 - () http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540 -
References () http://www.debian.org/security/2008/dsa-1468 - () http://www.debian.org/security/2008/dsa-1468 -
References () http://www.redhat.com/support/errata/RHSA-2008-0261.html - () http://www.redhat.com/support/errata/RHSA-2008-0261.html -
References () http://www.securityfocus.com/archive/1/500396/100/0/threaded - () http://www.securityfocus.com/archive/1/500396/100/0/threaded -
References () http://www.securityfocus.com/archive/1/500412/100/0/threaded - () http://www.securityfocus.com/archive/1/500412/100/0/threaded -
References () http://www.securityfocus.com/bid/27365 - () http://www.securityfocus.com/bid/27365 -
References () http://www.vupen.com/english/advisories/2008/0192 - () http://www.vupen.com/english/advisories/2008/0192 -
References () http://www.vupen.com/english/advisories/2009/0233 - () http://www.vupen.com/english/advisories/2009/0233 -
References () https://exchange.xforce.ibmcloud.com/vulnerabilities/39804 - () https://exchange.xforce.ibmcloud.com/vulnerabilities/39804 -
References () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E -
References () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E - () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E -

07 Nov 2023, 02:01

Type Values Removed Values Added
References
  • {'url': 'https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20190319 svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20190325 svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/', 'tags': [], 'refsource': 'MLIST'}
  • {'url': 'https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E', 'name': '[tomcat-dev] 20200213 svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/', 'tags': [], 'refsource': 'MLIST'}
  • () https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E -
  • () https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E -
  • () https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E -

Information

Published : 2008-01-23 02:00

Updated : 2024-11-21 00:41


NVD link : CVE-2008-0128

Mitre link : CVE-2008-0128

CVE.ORG link : CVE-2008-0128


JSON object : View

Products Affected

apache

  • tomcat
CWE
CWE-16

Configuration