Older, EOL versions may also be affected.
Analysis and contextual insights are available on OpenCVE Cloud.
No vendor fix or workaround currently provided.
Additional remediation guidance may be available on OpenCVE Cloud.
Tracking
Sign in to view the affected projects.
| Source | ID | Title |
|---|---|---|
Debian DLA |
DLA-3384-1 | tomcat9 security update |
Debian DSA |
DSA-5381-1 | tomcat9 security update |
EUVD |
EUVD-2023-0829 | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected. |
Github GHSA |
GHSA-2c9m-w27f-53rm | Apache Tomcat vulnerable to Unprotected Transport of Credentials |
Ubuntu USN |
USN-7106-1 | Tomcat vulnerabilities |
Ubuntu USN |
USN-7562-1 | Tomcat vulnerabilities |
Tue, 04 Nov 2025 20:30:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| References |
|
Thu, 07 Aug 2025 11:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Description | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected. |
Thu, 13 Feb 2025 15:15:00 +0000
| Type | Values Removed | Values Added |
|---|---|---|
| Metrics |
ssvc
|
Status: PUBLISHED
Assigner: apache
Published:
Updated: 2025-11-04T19:15:54.760Z
Reserved: 2023-03-21T17:26:28.837Z
Link: CVE-2023-28708
Updated: 2024-08-02T13:43:23.678Z
Status : Modified
Published: 2023-03-22T11:15:10.623
Modified: 2025-11-04T20:16:26.323
Link: CVE-2023-28708
OpenCVE Enrichment
No data.
Debian DLA
Debian DSA
EUVD
Github GHSA
Ubuntu USN