8.1
CVSSv3

CVE-2015-5346

Published: 25/02/2016 Updated: 08/12/2023
CVSS v2 Base Score: 6.8 | Impact Score: 6.4 | Exploitability Score: 8.6
CVSS v3 Base Score: 8.1 | Impact Score: 5.9 | Exploitability Score: 2.2
VMScore: 605
Vector: AV:N/AC:M/Au:N/C:P/I:P/A:P

Vulnerability Summary

Session fixation vulnerability in Apache Tomcat 7.x prior to 7.0.66, 8.x prior to 8.0.30, and 9.x prior to 9.0.0.M2, when different session settings are used for deployments of multiple versions of the same web application, might allow remote malicious users to hijack web sessions by leveraging use of a requestedSessionSSL field for an unintended request, related to CoyoteAdapter.java and Request.java.

Vulnerable Product Search on Vulmon Subscribe to Product

apache tomcat 7.0.2

apache tomcat 7.0.12

apache tomcat 7.0.62

apache tomcat 8.0.17

apache tomcat 7.0.53

apache tomcat 7.0.20

apache tomcat 7.0.34

apache tomcat 8.0.26

apache tomcat 7.0.55

apache tomcat 7.0.4

apache tomcat 7.0.63

apache tomcat 8.0.20

apache tomcat 7.0.22

apache tomcat 7.0.39

apache tomcat 7.0.26

apache tomcat 7.0.28

apache tomcat 8.0.1

apache tomcat 8.0.0

apache tomcat 7.0.59

apache tomcat 7.0.65

apache tomcat 7.0.50

apache tomcat 7.0.6

apache tomcat 8.0.12

apache tomcat 7.0.14

apache tomcat 8.0.27

apache tomcat 8.0.15

apache tomcat 7.0.11

apache tomcat 7.0.23

apache tomcat 7.0.0

apache tomcat 8.0.22

apache tomcat 8.0.29

apache tomcat 7.0.52

apache tomcat 7.0.42

apache tomcat 7.0.37

apache tomcat 7.0.29

apache tomcat 8.0.11

apache tomcat 8.0.24

apache tomcat 8.0.23

apache tomcat 7.0.47

apache tomcat 7.0.5

apache tomcat 8.0.21

apache tomcat 7.0.41

apache tomcat 7.0.30

apache tomcat 7.0.19

apache tomcat 7.0.16

apache tomcat 7.0.10

apache tomcat 8.0.18

apache tomcat 7.0.25

apache tomcat 7.0.54

apache tomcat 7.0.35

apache tomcat 7.0.61

apache tomcat 8.0.3

apache tomcat 7.0.57

apache tomcat 8.0.14

apache tomcat 7.0.32

apache tomcat 7.0.21

apache tomcat 7.0.27

apache tomcat 7.0.40

apache tomcat 7.0.56

apache tomcat 8.0.28

apache tomcat 7.0.64

apache tomcat 7.0.33

apache tomcat 9.0.0

canonical ubuntu linux 12.04

canonical ubuntu linux 16.04

canonical ubuntu linux 15.10

canonical ubuntu linux 14.04

debian debian linux 8.0

debian debian linux 7.0

Vendor Advisories

Several security issues were fixed in Tomcat ...
Synopsis Important: Red Hat JBoss Web Server 212 security update for Tomcat 7 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Web ServerRed Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring Sys ...
Synopsis Important: Red Hat JBoss Web Server 212 security update for Tomcat 7 Type/Severity Security Advisory: Important Topic An update is now available for Red Hat JBoss Enterprise Web Server 2 for RHEL 6 and Red Hat JBoss Enterprise Web Server 2 for RHEL 7Red Hat Product Security has rated this update ...
Synopsis Important: tomcat security update Type/Severity Security Advisory: Important Topic An update for tomcat is now available for Red Hat Enterprise Linux 7Red Hat Product Security has rated this update as having a security impact of Important A Common Vulnerability Scoring System (CVSS) base score, w ...
Multiple security vulnerabilities have been discovered in the Tomcat servlet and JSP engine, which may result in information disclosure, the bypass of CSRF protections, bypass of the SecurityManager or denial of service For the stable distribution (jessie), these problems have been fixed in version 8014-1+deb8u2 For the unstable distribution (s ...
Multiple security vulnerabilities have been discovered in the Tomcat servlet and JSP engine, which may result in information disclosure, the bypass of CSRF protections and bypass of the SecurityManager For the oldstable distribution (wheezy), these problems have been fixed in version 7028-4+deb7u4 This update also fixes CVE-2014-0119 and CVE-20 ...
ResourceLinkFactorysetGlobalContext() is a public method and was discovered to be accessible by web applications running under a security manager without any checks This allowed a malicious web application to inject a malicious global context that could in turn be used to disrupt other web applications and/or read and write data owned by other we ...
A directory traversal vulnerability in RequestUtiljava was discovered which allows remote authenticated users to bypass intended SecurityManager restrictions and list a parent directory via a / (slash dot dot) in a pathname used by a web application in a getResource, getResourceAsStream, or getResourcePaths call (CVE-2015-5174) A session fixati ...
A session fixation flaw was found in the way Tomcat recycled the requestedSessionSSL field If at least one web application was configured to use the SSL session ID as the HTTP session ID, an attacker could reuse a previously used session ID for further requests ...

References

NVD-CWE-Otherhttp://svn.apache.org/viewvc?view=revision&revision=1713185https://bz.apache.org/bugzilla/show_bug.cgi?id=58809http://svn.apache.org/viewvc?view=revision&revision=1713184http://svn.apache.org/viewvc?view=revision&revision=1713187http://tomcat.apache.org/security-8.htmlhttp://tomcat.apache.org/security-9.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1723414http://tomcat.apache.org/security-7.htmlhttp://svn.apache.org/viewvc?view=revision&revision=1723506http://seclists.org/bugtraq/2016/Feb/143http://www.debian.org/security/2016/dsa-3530https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05158626https://h20566.www2.hpe.com/portal/site/hpsc/public/kb/docDisplay?docId=emr_na-c05150442http://www.debian.org/security/2016/dsa-3609http://www.ubuntu.com/usn/USN-3024-1http://www.debian.org/security/2016/dsa-3552http://www.oracle.com/technetwork/topics/security/bulletinjan2016-2867206.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2046.htmlhttp://www.oracle.com/technetwork/topics/security/linuxbulletinoct2016-3090545.htmlhttp://www.securityfocus.com/bid/83323https://access.redhat.com/errata/RHSA-2016:1087http://rhn.redhat.com/errata/RHSA-2016-1089.htmlhttps://access.redhat.com/errata/RHSA-2016:1088http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00047.htmlhttp://lists.opensuse.org/opensuse-security-announce/2016-03/msg00085.htmlhttps://bto.bluecoat.com/security-advisory/sa118http://lists.opensuse.org/opensuse-security-announce/2016-03/msg00069.htmlhttp://www.securitytracker.com/id/1035069http://packetstormsecurity.com/files/135890/Apache-Tomcat-Session-Fixation.htmlhttps://security.gentoo.org/glsa/201705-09http://rhn.redhat.com/errata/RHSA-2016-2808.htmlhttp://rhn.redhat.com/errata/RHSA-2016-2807.htmlhttps://security.netapp.com/advisory/ntap-20180531-0001/http://www.oracle.com/technetwork/security-advisory/cpujul2018-4258247.htmlhttps://lists.apache.org/thread.html/r9136ff5b13e4f1941360b5a309efee2c114a14855578c3a2cbe5d19c%40%3Cdev.tomcat.apache.org%3Ehttps://usn.ubuntu.com/3024-1/https://nvd.nist.gov