When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.

Older, EOL versions may also be affected.
Advisories
Source ID Title
Debian DLA Debian DLA DLA-3384-1 tomcat9 security update
Debian DSA Debian DSA DSA-5381-1 tomcat9 security update
EUVD EUVD EUVD-2023-0829 When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.
Github GHSA Github GHSA GHSA-2c9m-w27f-53rm Apache Tomcat vulnerable to Unprotected Transport of Credentials
Ubuntu USN Ubuntu USN USN-7106-1 Tomcat vulnerabilities
Ubuntu USN Ubuntu USN USN-7562-1 Tomcat vulnerabilities
Fixes

Solution

No solution given by the vendor.


Workaround

No workaround given by the vendor.

History

Thu, 07 Aug 2025 11:15:00 +0000

Type Values Removed Values Added
Description When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.

Thu, 13 Feb 2025 15:15:00 +0000

Type Values Removed Values Added
Metrics ssvc

{'options': {'Automatable': 'no', 'Exploitation': 'none', 'Technical Impact': 'partial'}, 'version': '2.0.3'}


cve-icon MITRE

Status: PUBLISHED

Assigner: apache

Published:

Updated: 2025-08-07T10:57:11.912Z

Reserved: 2023-03-21T17:26:28.837Z

Link: CVE-2023-28708

cve-icon Vulnrichment

Updated: 2024-08-02T13:43:23.678Z

cve-icon NVD

Status : Modified

Published: 2023-03-22T11:15:10.623

Modified: 2025-08-07T11:15:26.630

Link: CVE-2023-28708

cve-icon Redhat

Severity : Moderate

Publid Date: 2023-03-22T00:00:00Z

Links: CVE-2023-28708 - Bugzilla

cve-icon OpenCVE Enrichment

No data.