CVE-2007-5333

medium
New! CVE Severity Now Using CVSS v3

The calculated severity for CVEs has been updated to use CVSS v3 by default. CVEs that do not have a CVSS v3 score will fall back CVSS v2 for calculating severity. Severity display preferences can be toggled in the settings dropdown.

Description

Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.

References

http://jvn.jp/jp/JVN%2309470767/index.html

http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html

http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html

http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html

http://marc.info/?l=bugtraq&m=139344343412337&w=2

http://secunia.com/advisories/28878

http://secunia.com/advisories/28884

http://secunia.com/advisories/28915

http://secunia.com/advisories/29711

http://secunia.com/advisories/30676

http://secunia.com/advisories/30802

http://secunia.com/advisories/32036

http://secunia.com/advisories/32222

http://secunia.com/advisories/33330

http://secunia.com/advisories/37460

http://secunia.com/advisories/44183

http://secunia.com/advisories/57126

http://security.gentoo.org/glsa/glsa-200804-10.xml

http://securityreason.com/securityalert/3636

http://support.apple.com/kb/HT2163

http://support.apple.com/kb/HT3216

http://tomcat.apache.org/security-4.html

http://tomcat.apache.org/security-5.html

http://tomcat.apache.org/security-6.html

http://www.mandriva.com/security/advisories?name=MDVSA-2009:018

http://www.mandriva.com/security/advisories?name=MDVSA-2010:176

http://www.redhat.com/docs/en-US/JBoss_Enterprise_Application_Platform/4.2.0.cp08/html-single/Release_Notes/index.html

http://www.securityfocus.com/archive/1/487822/100/0/threaded

http://www.securityfocus.com/archive/1/507985/100/0/threaded

http://www.securityfocus.com/bid/27706

http://www.securityfocus.com/bid/31681

http://www.vmware.com/security/advisories/VMSA-2008-0010.html

http://www.vmware.com/security/advisories/VMSA-2009-0016.html

http://www.vupen.com/english/advisories/2008/0488

http://www.vupen.com/english/advisories/2008/1856/references

http://www.vupen.com/english/advisories/2008/1981/references

http://www.vupen.com/english/advisories/2008/2690

http://www.vupen.com/english/advisories/2008/2780

http://www.vupen.com/english/advisories/2009/3316

http://www-01.ibm.com/support/docview.wss?uid=swg24018932

http://www-01.ibm.com/support/docview.wss?uid=swg27012047

http://www-01.ibm.com/support/docview.wss?uid=swg27012048

http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133

http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991

https://bugzilla.redhat.com/show_bug.cgi?id=532111

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://lists.apache.org/thread.html/[email protected]%3Cdev.tomcat.apache.org%3E

https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11177

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html

https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html

Details

Source: MITRE

Published: 2008-02-12

Updated: 2019-03-25

Type: CWE-200

Risk Information

CVSS v2

Base Score: 5

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Impact Score: 2.9

Exploitability Score: 10

Severity: MEDIUM

Vulnerable Software

Configuration 1

OR

cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:5.5.25:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.14:*:*:*:*:*:*:*

cpe:2.3:a:apache:tomcat:6.0.15:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:4.1:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:4.1.32:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:4.1.34:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:4.1.37:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:5.0:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:5.1:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:5.2:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:5.3:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:5.4:*:*:*:*:*:*:*

cpe:2.3:a:apache_software_foundation:tomcat:5.5:*:*:*:*:*:*:*

Tenable Plugins

View all (25 total)

IDNameProductFamilySeverity
89117VMware ESX / ESXi Multiple Vulnerabilities (VMSA-2009-0016) (remote check)NessusMisc.
critical
67895Oracle Linux 5 : tomcat (ELSA-2009-1164)NessusOracle Linux Local Security Checks
medium
60621Scientific Linux Security Update : tomcat on SL5.x i386/x86_64NessusScientific Linux Local Security Checks
medium
49206Mandriva Linux Security Advisory : tomcat5 (MDVSA-2010:176)NessusMandriva Local Security Checks
medium
47577Apache Tomcat < 6.0.16 Multiple VulnerabilitiesNessusWeb Servers
medium
47576Apache Tomcat < 5.5.26 Multiple VulnerabilitiesNessusWeb Servers
medium
47030Apache Tomcat 4.x < 4.1.37 Multiple VulnerabilitiesNessusWeb Servers
medium
43845RHEL 4 : tomcat in Satellite Server (RHSA-2009:1617)NessusRed Hat Local Security Checks
medium
43844RHEL 4 : tomcat in Satellite Server (RHSA-2009:1616)NessusRed Hat Local Security Checks
medium
43770CentOS 5 : tomcat (CESA-2009:1164)NessusCentOS Local Security Checks
medium
42870VMSA-2009-0016 : VMware vCenter and ESX update release and vMA patch release address multiple security issues in third party components.NessusVMware ESX Local Security Checks
medium
41596SuSE 10 Security Update : Websphere Community Edition (ZYPP Patch Number 5850)NessusSuSE Local Security Checks
high
40379VMSA-2008-0010 : Updated Tomcat and Java JRE packages for VMware ESX 3.5 and VirtualCenterNessusVMware ESX Local Security Checks
critical
40371VMSA-2008-00010 : Updated Tomcat and Java JRE packages for VMware, ESX 3.5 and VirtualCenter 2.5 (DEPRECATED)NessusVMware ESX Local Security Checks
critical
40342RHEL 5 : tomcat (RHSA-2009:1164)NessusRed Hat Local Security Checks
medium
36308Mandriva Linux Security Advisory : tomcat5 (MDVSA-2009:018)NessusMandriva Local Security Checks
medium
34374Mac OS X Multiple Vulnerabilities (Security Update 2008-007)NessusMacOS X Local Security Checks
critical
33282Mac OS X Multiple Vulnerabilities (Security Update 2008-004)NessusMacOS X Local Security Checks
critical
33281Mac OS X 10.5.x < 10.5.4 Multiple VulnerabilitiesNessusMacOS X Local Security Checks
critical
31957GLSA-200804-10 : Tomcat: Multiple vulnerabilitiesNessusGentoo Local Security Checks
medium
31074Fedora 8 : tomcat5-5.5.26-1jpp.2.fc8 (2008-1603)NessusFedora Local Security Checks
medium
31062Fedora 7 : tomcat5-5.5.26-1jpp.2.fc7 (2008-1467)NessusFedora Local Security Checks
medium
4368Apache Tomcat 6.0.x < 6.0.16 Information DisclosureNessus Network MonitorWeb Servers
medium
4564Mac OS X < 10.5.4 Multiple VulnerabilitiesNessus Network MonitorGeneric
critical
800623Apache Tomcat < 6.0.16 Information DisclosureLog Correlation EngineWeb Servers
medium