Bug 429821 - (CVE-2008-0128) CVE-2008-0128 tomcat5 SSO cookie login information disclosure
CVE-2008-0128 tomcat5 SSO cookie login information disclosure
Status: CLOSED ERRATA
Product: Security Response
Classification: Other
Component: vulnerability (Show other bugs)
unspecified
All Linux
low Severity low
: ---
: ---
Assigned To: Red Hat Product Security
source=cve,public=20061220,reported=2...
: Reopened, Security
Depends On: 429826 429827 429828 429829 429830 429831 429834 429835 429903 429904 429905 440521 445320 449337 470236 470237
Blocks: 444136
  Show dependency treegraph
 
Reported: 2008-01-23 04:21 EST by Marc Schoenefeld
Modified: 2012-06-06 01:56 EDT (History)
3 users (show)

See Also:
Fixed In Version:
Doc Type: Bug Fix
Doc Text:
Story Points: ---
Clone Of:
Environment:
Last Closed: 2012-06-06 01:56:50 EDT
Type: ---
Regression: ---
Mount Type: ---
Documentation: ---
CRM:
Verified Versions:
Category: ---
oVirt Team: ---
RHEL 7.3 requirements from Atomic Host:
Cloudforms Team: ---


Attachments (Terms of Use)

  None (edit)
Description Marc Schoenefeld 2008-01-23 04:21:50 EST
Description of problem:

from [http://issues.apache.org/bugzilla/show_bug.cgi?id=41217]

"""When using the SingleSignOn Valve
(org.apache.catalina.authenticator.SingleSignOn) via https the Cookie
JSESSIONIDSSO is transmitted without the "secure" attribute, resulting in it
being transmitted to any content that is - by purpose or error - requested via
http from the same server. 

As the content of the SSO-Cookie is confidential (it will lead to automatically
logged in sessions in other contexts - https or non-https) this should never
happen. """

Also according to the asf bz the upstream versions before 5.5.21 are vulnerable.
Comment 9 errata-xmlrpc 2010-08-04 17:31:31 EDT
This issue has been addressed in following products:

  Red Hat Certificate System 7.3

Via RHSA-2010:0602 https://rhn.redhat.com/errata/RHSA-2010-0602.html

Note You need to log in before you can comment on or make changes to this bug.