When using FORM authentication with Apache Tomcat 9.0.0.M1 to 9.0.29, 8.5.0 to 8.5.49 and 7.0.0 to 7.0.98 there was a narrow window where an attacker could perform a session fixation attack. The window was considered too narrow for an exploit to be practical but, erring on the side of caution, this issue has been treated as a security vulnerability.
References
Configurations
Configuration 1 (hide)
|
Configuration 2 (hide)
|
Configuration 3 (hide)
|
Configuration 4 (hide)
|
Configuration 5 (hide)
|
History
21 Nov 2024, 04:32
Type | Values Removed | Values Added |
---|---|---|
References | () http://lists.opensuse.org/opensuse-security-announce/2020-01/msg00013.html - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/8b4c1db8300117b28a0f3f743c0b9e3f964687a690cdf9662a884bbd%40%3Cannounce.tomcat.apache.org%3E - Mailing List, Vendor Advisory | |
References | () https://lists.apache.org/thread.html/r3bbb800a816d0a51eccc5a228c58736960a9fffafa581a225834d97d%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r48c1444845fe15a823e1374674bfc297d5008a5453788099ea14caf0%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r6ccee4e849bc77df0840c7f853f6bd09d426f6741247da2b7429d5d9%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/raba0fabaf4d56d4325ab2aca8814f0b30a237ab83d8106b115ee279a%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/reb9a66f176df29b9a832caa95ebd9ffa3284e8f4922ec4fa3ad8eb2e%40%3Cissues.cxf.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2020/01/msg00024.html - Third Party Advisory | |
References | () https://lists.debian.org/debian-lts-announce/2020/05/msg00026.html - Mailing List, Third Party Advisory | |
References | () https://seclists.org/bugtraq/2019/Dec/43 - Mailing List, Third Party Advisory | |
References | () https://security.gentoo.org/glsa/202003-43 - Third Party Advisory | |
References | () https://security.netapp.com/advisory/ntap-20200107-0001/ - Third Party Advisory | |
References | () https://usn.ubuntu.com/4251-1/ - Third Party Advisory | |
References | () https://www.debian.org/security/2019/dsa-4596 - Third Party Advisory | |
References | () https://www.debian.org/security/2020/dsa-4680 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpuapr2020.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2021.html - Patch, Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujul2020.html - Patch, Third Party Advisory |
07 Nov 2023, 03:06
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2019-12-23 17:15
Updated : 2024-11-21 04:32
NVD link : CVE-2019-17563
Mitre link : CVE-2019-17563
CVE.ORG link : CVE-2019-17563
JSON object : View
Products Affected
canonical
- ubuntu_linux
apache
- tomcat
oracle
- agile_engineering_data_management
- mysql_enterprise_monitor
- transportation_management
- retail_order_broker
- instantis_enterprisetrack
- hyperion_infrastructure_technology
- micros_relate_crm_software
opensuse
- leap
debian
- debian_linux
CWE
CWE-384
Session Fixation