CVE-2007-3382

CVSS V2 Medium 4.3 CVSS V3 None
Description
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 treats single quotes ("'") as delimiters in cookies, which might cause sensitive information such as session IDs to be leaked and allow remote attackers to conduct session hijacking attacks.
Overview
  • CVE ID
  • CVE-2007-3382
  • Assigner
  • secalert@redhat.com
  • Vulnerability Status
  • Modified
  • Published Version
  • 2007-08-14T22:17:00
  • Last Modified Date
  • 2019-03-25T11:29:31
CPE Configuration (Product)
CPE Vulnerable Operator Version Start Version End
cpe:2.3:a:apache:tomcat:3.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.3.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.3.1a:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:3.3.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.3:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.9:beta:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.31:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:4.1.36:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.25:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.26:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.27:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.28:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.29:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.0.30:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.13:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.14:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.15:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.16:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.17:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.18:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.19:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.20:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.21:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.22:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.23:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:5.5.24:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.0:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.1:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.2:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.3:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.4:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.5:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.6:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.7:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.8:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.9:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.10:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.11:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.12:*:*:*:*:*:*:* 1 OR
cpe:2.3:a:apache:tomcat:6.0.13:*:*:*:*:*:*:* 1 OR
CVSS Version 2
  • Version
  • 2.0
  • Vector String
  • AV:N/AC:M/Au:N/C:P/I:N/A:N
  • Access Vector
  • NETWORK
  • Access Compatibility
  • MEDIUM
  • Authentication
  • NONE
  • Confidentiality Impact
  • PARTIAL
  • Integrity Impact
  • NONE
  • Availability Impact
  • NONE
  • Base Score
  • 4.3
  • Severity
  • MEDIUM
  • Exploitability Score
  • 8.6
  • Impact Score
  • 2.9
References
Reference URL Reference Tags
http://tomcat.apache.org/security-6.html Patch
http://www.kb.cert.org/vuls/id/993544 Patch US Government Resource
https://www.redhat.com/archives/fedora-package-announce/2007-November/msg00525.html
http://www.redhat.com/support/errata/RHSA-2007-0871.html
http://www.redhat.com/support/errata/RHSA-2007-0950.html
http://www.securityfocus.com/bid/25316
http://securitytracker.com/id?1018556
http://secunia.com/advisories/26466
http://secunia.com/advisories/26898
http://secunia.com/advisories/27037
http://secunia.com/advisories/27267
http://secunia.com/advisories/27727
http://www.debian.org/security/2008/dsa-1447
http://www.debian.org/security/2008/dsa-1453
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
http://secunia.com/advisories/28317
http://secunia.com/advisories/28361
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
http://secunia.com/advisories/29242
http://www.redhat.com/support/errata/RHSA-2008-0195.html
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://support.apple.com/kb/HT2163
http://secunia.com/advisories/30802
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
http://secunia.com/advisories/33668
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
http://secunia.com/advisories/36486
http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01178795
http://www.vupen.com/english/advisories/2009/0233
http://www.vupen.com/english/advisories/2007/3386
http://www.vupen.com/english/advisories/2007/3527
http://www.vupen.com/english/advisories/2008/1981/references
http://h20000.www2.hp.com/bizsupport/TechSupport/Document.jsp?objectID=c01192554
http://www.vupen.com/english/advisories/2007/2902
https://exchange.xforce.ibmcloud.com/vulnerabilities/36006
https://oval.cisecurity.org/repository/search/definition/oval%3Aorg.mitre.oval%3Adef%3A11269
http://www.securityfocus.com/archive/1/500412/100/0/threaded
http://www.securityfocus.com/archive/1/500396/100/0/threaded
http://www.securityfocus.com/archive/1/476466/100/0/threaded
http://www.securityfocus.com/archive/1/476442/100/0/threaded
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
History
Created Old Value New Value Data Type Notes
2022-05-10 17:45:54 Added to TrackCVE