ALAS2-2023-2020

Related Vulnerabilities: CVE-2023-28708  

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. (CVE-2023-28708)

ALAS2-2023-2020


Amazon Linux 2 Security Advisory: ALAS-2023-2020
Advisory Release Date: 2023-04-27 18:36 Pacific
Advisory Updated Date: 2023-05-02 19:18 Pacific
Severity: Important

Issue Overview:

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. (CVE-2023-28708)


Affected Packages:

tomcat


Issue Correction:
Run yum update tomcat to update your system.

New Packages:
noarch:
    tomcat-7.0.76-10.amzn2.0.3.noarch
    tomcat-admin-webapps-7.0.76-10.amzn2.0.3.noarch
    tomcat-docs-webapp-7.0.76-10.amzn2.0.3.noarch
    tomcat-javadoc-7.0.76-10.amzn2.0.3.noarch
    tomcat-jsvc-7.0.76-10.amzn2.0.3.noarch
    tomcat-jsp-2.2-api-7.0.76-10.amzn2.0.3.noarch
    tomcat-lib-7.0.76-10.amzn2.0.3.noarch
    tomcat-servlet-3.0-api-7.0.76-10.amzn2.0.3.noarch
    tomcat-el-2.2-api-7.0.76-10.amzn2.0.3.noarch
    tomcat-webapps-7.0.76-10.amzn2.0.3.noarch

src:
    tomcat-7.0.76-10.amzn2.0.3.src