Skip to main content

CVE-2023-28708

Severity

6.5

Description

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.

Mitigation

We recommend upgrading to a version of this component that is not vulnerable to this specific issue.
**NOTE:** Support for Apache Tomcat 7.x ended on 31st March 2021. Future 7.x releases containing security fixes are unlikely and users should consider upgrading to later, non-vulnerable versions of the project.

Note: If this component is included as a bundled/transitive dependency of another component, there may not be an upgrade path. In this instance, we recommend contacting the maintainers who included the vulnerable package. Alternatively, we recommend investigating alternative components or a potential mitigating control.

Project

Category
CWE-523 Unprotected Transport of Credentials
Tags
data
operational
Date Disclosed

2023-03-22

Date Discovered

2023-03-21

Apache Tomcat 10.1.x

First release:
2022-09-23
0
Support Lifecycle:
Namespace:
javax

Apache TomEE 9.0.x

First release:
2023-01-03
0
Support Lifecycle:
Namespace:
javax

Apache TomEE 7.1.x

First release:
2018-09-02
0
Support Lifecycle:
Namespace:
javax

Apache TomEE 7.0.x

First release:
2016-05-17
0
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.7.x

First release:
2014-08-09
0
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.6.x

First release:
2013-11-17
0
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.5.x

First release:
2012-09-28
0
Support Lifecycle:
Namespace:
javax

Apache TomEE 1.0.x

First release:
2012-04-27
0
Support Lifecycle:
Namespace:
javax
Feel Vulnerable? 

Contact us so we can help you.

* These fields are required.