4.3
CVSSv2

CVE-2014-0033

Published: 26/02/2014 Updated: 07/11/2023
CVSS v2 Base Score: 4.3 | Impact Score: 2.9 | Exploitability Score: 8.6
VMScore: 383
Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N

Vulnerability Summary

org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 up to and including 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote malicious users to conduct session fixation attacks via a crafted URL.

Vulnerability Trend

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 6.0.33

apache tomcat 6.0.34

apache tomcat 6.0.37

apache tomcat 6.0.35

apache tomcat 6.0.36

Vendor Advisories

Several security issues were fixed in Tomcat ...
It was found that previous fixes in Tomcat 6 to path parameter handling introduced a regression that caused Tomcat to not properly disable URL rewriting to track session IDs when the disableURLRewriting option was enabled A man-in-the-middle attacker could potentially use this flaw to hijack a user's session ...

References

CWE-20http://svn.apache.org/viewvc?view=revision&revision=1558822http://tomcat.apache.org/security-6.htmlhttps://bugzilla.redhat.com/show_bug.cgi?id=1069919http://www-01.ibm.com/support/docview.wss?uid=swg21678231http://www.securityfocus.com/bid/65769http://www-01.ibm.com/support/docview.wss?uid=swg21675886http://secunia.com/advisories/59873http://secunia.com/advisories/59036http://secunia.com/advisories/59722http://www-01.ibm.com/support/docview.wss?uid=swg21677147http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.htmlhttp://www.vmware.com/security/advisories/VMSA-2014-0012.htmlhttp://seclists.org/fulldisclosure/2014/Dec/23http://www.debian.org/security/2016/dsa-3530http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.htmlhttp://www.ubuntu.com/usn/USN-2130-1http://www.securityfocus.com/archive/1/534161/100/0/threadedhttps://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3Ehttps://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3Ehttps://nvd.nist.govhttps://usn.ubuntu.com/2130-1/https://access.redhat.com/security/cve/cve-2014-0033