Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.
Subscriptions
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Debian DSA |
DSA-1447-1 | New tomcat5.5 packages fix several vulnerabilities |
Debian DSA |
DSA-1453-1 | New tomcat5 packages fix several vulnerabilities |
Github GHSA |
GHSA-6j8f-66vh-39mj | Apache Tomcat Mishandles Character Sequence in Cookies |
Fixes
Solution
No solution given by the vendor.
Workaround
No workaround given by the vendor.
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T14:14:12.922Z
Reserved: 2007-06-25T00:00:00.000Z
Link: CVE-2007-3385
No data.
Status : Deferred
Published: 2007-08-14T22:17:00.000
Modified: 2025-04-09T00:30:58.490
Link: CVE-2007-3385
OpenCVE Enrichment
No data.
Weaknesses
Debian DSA
Github GHSA