4.3
CVSSv2

CVE-2014-0033

Published: 26/02/2014 Updated: 15/04/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 up to and including 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote malicious users to conduct session fixation attacks via a crafted URL.

Most Upvoted Vulmon Research Post

There is no Researcher post for this vulnerability
Would you like to share something about it? Sign up now to share your knowledge with the community.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 6.0.37

apache tomcat 6.0.35

apache tomcat 6.0.36

apache tomcat 6.0.33

apache tomcat 6.0.34

Vendor Advisories

It was found that previous fixes in Tomcat 6 to path parameter handling introduced a regression that caused Tomcat to not properly disable URL rewriting to track session IDs when the disableURLRewriting option was enabled A man-in-the-middle attacker could potentially use this flaw to hijack a user's session ...
Several security issues were fixed in Tomcat ...
<!-- Start - Changes for Security Advisory Channel --> Security Advisory ID SYMSA1329 Initial Publication Date: Advisory Status: Advisory Severity: CVSS Base Score: Legacy ID 23 Jul 2015 Open High CVSS v2: 78 SA100 ...

References

CWE-20http://svn.apache.org/viewvc?view=revision&revision=1558822http://tomcat.apache.org/security-6.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=1069919http://www-01.ibm.com/support/docview.wss?uid=swg21678231http://www.securityfocus.com/bid/65769http://www-01.ibm.com/support/docview.wss?uid=swg21675886http://secunia.com/advisories/59873http://secunia.com/advisories/59036http://secunia.com/advisories/59722http://www-01.ibm.com/support/docview.wss?uid=swg21677147http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlhttp://www.vmware.com/security/advisories/VMSA-2014-0012.htmlhttp://seclists.org/fulldisclosure/2014/Dec/23http://www.debian.org/security/2016/dsa-3530http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlhttp://www.ubuntu.com/usn/USN-2130-1http://www.securityfocus.com/archive/1/534161/100/0/threadedhttps://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3Ehttps://nvd.nist.govhttps://www.securityfocus.com/bid/65769https://access.redhat.com/security/cve/cve-2014-0033https://usn.ubuntu.com/2130-1/http://tools.cisco.com/security/center/viewAlert.x?alertId=34943