CVE-2023-28708
22.03.2023, 11:15
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did notinclude the secure attribute. This could result in the user agenttransmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.Enginsight
Vendor | Product | Version |
---|---|---|
apache | tomcat | 8.5.0 ≤ 𝑥 < 8.5.86 |
apache | tomcat | 9.0.0 < 𝑥 < 9.0.72 |
apache | tomcat | 10.1.0 < 𝑥 < 10.1.6 |
apache | tomcat | 11.0.0:milestone1 |
apache | tomcat | 11.0.0:milestone2 |
𝑥
= Vulnerable software versions

Debian Releases

Ubuntu Releases
Ubuntu Product | |||||||||||||||||||||
---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|---|
tomcat10 |
| ||||||||||||||||||||
tomcat8 |
| ||||||||||||||||||||
tomcat9 |
|
Common Weakness Enumeration