漏洞信息详情
Apache Tomcat 'SingleSignOn' 远程信息泄露漏洞
- CNNVD编号:CNNVD-200801-336
- 危害等级: 低危
- CVE编号: CVE-2008-0128
- 漏洞类型: 配置错误
- 发布时间: 2008-01-22
- 威胁类型: 远程
- 更新时间: 2019-04-02
- 厂 商: apache
- 漏洞来源: Olaf Kock
漏洞简介
Apache Tomcat 5.5.21之前的版本中的SingleSignOn Valve(org.apache.catalina.authenticator.SingleSignOn)未为https session中的jsESSIONidSSO cookie设置安全的标记,这会导致cookie在http请求中被发送出去,并使得远程攻击者更容易获取该cookie。
漏洞公告
参考网址
来源:SUSE
链接:http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.HTML
来源:REDHAT
链接:http://www.redhat.com/support/errata/RHSA-2008-0261.HTML
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2009/0233
来源:CONFIRM
链接:http://issues.apache.org/bugzilla/show_bug.cgi?id=41217
来源:SECUNIA
链接:http://secunia.com/advisories/28549
来源:SECUNIA
链接:http://secunia.com/advisories/31493
来源:XF
链接:https://exchange.xforce.ibmcloud.com/vulnerabilities/39804
来源:MLIST
链接:https://lists.apache.org/thread.HTML/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
来源:MLIST
链接:https://lists.apache.org/thread.HTML/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
来源:REDHAT
链接:http://rhn.redhat.com/errata/RHSA-2008-0630.HTML
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/500412/100/0/threaded
来源:SECUNIA
链接:http://secunia.com/advisories/33668
来源:CONFIRM
链接:http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
来源:CONFIRM
链接:http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
来源:BID
链接:http://www.securityfocus.com/bid/27365
来源:SECUNIA
链接:http://secunia.com/advisories/28552
来源:BUGTRAQ
链接:http://www.securityfocus.com/archive/1/500396/100/0/threaded
来源:SECUNIA
链接:http://secunia.com/advisories/29242
来源:CONFIRM
链接:http://security-tracker.debian.net/tracker/CVE-2008-0128
来源:DEBIAN
链接:http://www.debian.org/security/2008/dsa-1468
来源:VUPEN
链接:http://www.vupen.com/english/advisories/2008/0192
受影响实体
- Apache Tomcat:5.5.20
补丁
暂无
评论