First published: Wed Jan 23 2008(Updated: )
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
Credit: cve@mitre.org cve@mitre.org
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Tomcat | <=5.5.20 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
CVE-2008-0128 is considered a medium severity vulnerability due to the potential for cookie interception.
To fix CVE-2008-0128, upgrade Apache Tomcat to version 5.5.21 or later where the issue is resolved.
CVE-2008-0128 can expose applications to session hijacking if the JSESSIONIDSSO cookie is transmitted over insecure HTTP.
CVE-2008-0128 affects all versions of Apache Tomcat before 5.5.21.
CVE-2008-0128 fails to set the secure flag on the JSESSIONIDSSO cookie in HTTPS sessions, allowing it to be sent over HTTP.