First published: Tue Aug 14 2007(Updated: )
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
Credit: secalert@redhat.com secalert@redhat.com secalert@redhat.com
Affected Software | Affected Version | How to fix |
---|---|---|
maven/org.apache.tomcat:tomcat | >=3.3.0<=3.3.2 | |
maven/org.apache.tomcat:tomcat | >=4.1.0<=4.1.36 | |
maven/org.apache.tomcat:tomcat | >=5.0.0<=5.0.30 | |
maven/org.apache.tomcat:tomcat | >=5.5.0<=5.5.24 | |
maven/org.apache.tomcat:tomcat | >=6.0.0<=6.0.13 | |
Tomcat | =3.3 | |
Tomcat | =3.3.1 | |
Tomcat | =3.3.1a | |
Tomcat | =3.3.2 | |
Tomcat | =4.1.0 | |
Tomcat | =4.1.1 | |
Tomcat | =4.1.2 | |
Tomcat | =4.1.3 | |
Tomcat | =4.1.3-beta | |
Tomcat | =4.1.9-beta | |
Tomcat | =4.1.10 | |
Tomcat | =4.1.15 | |
Tomcat | =4.1.24 | |
Tomcat | =4.1.28 | |
Tomcat | =4.1.31 | |
Tomcat | =4.1.36 | |
Tomcat | =5.0.0 | |
Tomcat | =5.0.1 | |
Tomcat | =5.0.2 | |
Tomcat | =5.0.3 | |
Tomcat | =5.0.4 | |
Tomcat | =5.0.5 | |
Tomcat | =5.0.6 | |
Tomcat | =5.0.7 | |
Tomcat | =5.0.8 | |
Tomcat | =5.0.9 | |
Tomcat | =5.0.10 | |
Tomcat | =5.0.11 | |
Tomcat | =5.0.12 | |
Tomcat | =5.0.13 | |
Tomcat | =5.0.14 | |
Tomcat | =5.0.15 | |
Tomcat | =5.0.16 | |
Tomcat | =5.0.17 | |
Tomcat | =5.0.18 | |
Tomcat | =5.0.19 | |
Tomcat | =5.0.21 | |
Tomcat | =5.0.22 | |
Tomcat | =5.0.23 | |
Tomcat | =5.0.24 | |
Tomcat | =5.0.25 | |
Tomcat | =5.0.26 | |
Tomcat | =5.0.27 | |
Tomcat | =5.0.28 | |
Tomcat | =5.0.29 | |
Tomcat | =5.0.30 | |
Tomcat | =5.5.0 | |
Tomcat | =5.5.1 | |
Tomcat | =5.5.2 | |
Tomcat | =5.5.3 | |
Tomcat | =5.5.4 | |
Tomcat | =5.5.5 | |
Tomcat | =5.5.6 | |
Tomcat | =5.5.7 | |
Tomcat | =5.5.8 | |
Tomcat | =5.5.9 | |
Tomcat | =5.5.10 | |
Tomcat | =5.5.11 | |
Tomcat | =5.5.12 | |
Tomcat | =5.5.13 | |
Tomcat | =5.5.14 | |
Tomcat | =5.5.15 | |
Tomcat | =5.5.16 | |
Tomcat | =5.5.17 | |
Tomcat | =5.5.18 | |
Tomcat | =5.5.19 | |
Tomcat | =5.5.20 | |
Tomcat | =5.5.21 | |
Tomcat | =5.5.22 | |
Tomcat | =5.5.23 | |
Tomcat | =5.5.24 | |
Tomcat | =6.0.0 | |
Tomcat | =6.0.1 | |
Tomcat | =6.0.2 | |
Tomcat | =6.0.3 | |
Tomcat | =6.0.4 | |
Tomcat | =6.0.5 | |
Tomcat | =6.0.6 | |
Tomcat | =6.0.7 | |
Tomcat | =6.0.8 | |
Tomcat | =6.0.9 | |
Tomcat | =6.0.10 | |
Tomcat | =6.0.11 | |
Tomcat | =6.0.12 | |
Tomcat | =6.0.13 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2007-3382 is considered to have a medium severity, as it can lead to session hijacking attacks.
To fix CVE-2007-3382, upgrade Apache Tomcat to version 6.0.14 or later, or to version 5.5.25 or later.
CVE-2007-3382 affects Apache Tomcat versions from 3.3 to 6.0.13.
CVE-2007-3382 can be exploited by remote attackers to leak sensitive information such as session IDs.
There are no specific workarounds for CVE-2007-3382 other than upgrading to secure versions of Apache Tomcat.