4.3
CVSSv2

CVE-2014-0033

Published: 26/02/2014 Updated: 15/04/2019
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 up to and including 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote malicious users to conduct session fixation attacks via a crafted URL.

Affected Products

Vendor Product Versions
ApacheTomcat6.0.33, 6.0.34, 6.0.35, 6.0.36, 6.0.37

Vendor Advisories

It was found that previous fixes in Tomcat 6 to path parameter handling introduced a regression that caused Tomcat to not properly disable URL rewriting to track session IDs when the disableURLRewriting option was enabled A man-in-the-middle attacker could potentially use this flaw to hijack a user's session ...
Several security issues were fixed in Tomcat ...
<!-- Start - Changes for Security Advisory Channel --> Security Advisory ID SYMSA1329 Initial Publication Date: Advisory Status: Advisory Severity: CVSS Base Score: Legacy ID 23 Jul 2015 Open High CVSS v2: 78 SA100 ...

References

CWE-20http://seclists.org/fulldisclosure/2014/Dec/23http://secunia.com/advisories/59036http://secunia.com/advisories/59722http://secunia.com/advisories/59873http://svn.apache.org/viewvc?view=revision&revision=1558822http://tomcat.apache.org/security-6.htmlhttp://www.debian.org/security/2016/dsa-3530http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlhttp://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlhttp://www.securityfocus.com/archive/1/534161/100/0/threadedhttp://www.securityfocus.com/bid/65769http://www.ubuntu.com/usn/USN-2130-1http://www.vmware.com/security/advisories/VMSA-2014-0012.htmlhttp://www-01.ibm.com/support/docview.wss?uid=swg21675886http://www-01.ibm.com/support/docview.wss?uid=swg21677147http://www-01.ibm.com/support/docview.wss?uid=swg21678231https://bugzilla.redhat.com/show_bug.cgi?id=1069919https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c@%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b@%3Cdev.tomcat.apache.org%3Ehttps://www.rapid7.com/db/vulnerabilities/apache-tomcat-cve-2014-0033https://nvd.nist.govhttps://access.redhat.com/security/cve/cve-2014-0033https://usn.ubuntu.com/2130-1/http://tools.cisco.com/security/center/viewAlert.x?alertId=34943