Description
Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.
Analysis and contextual insights are available on OpenCVE Cloud.
Remediation
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
Advisories
| Source | ID | Title |
|---|---|---|
Github GHSA |
GHSA-cww4-vj5r-rx57 | Exposure of Sensitive Information in Apache Tomcat |
References
History
No history.
Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T15:24:42.490Z
Reserved: 2007-10-10T00:00:00.000Z
Link: CVE-2007-5333
No data.
Status : Modified
Published: 2008-02-12T01:00:00.000
Modified: 2026-04-23T00:35:47.467
Link: CVE-2007-5333
OpenCVE Enrichment
No data.
Weaknesses
Github GHSA