// For flags

CVE-2014-0033

tomcat: session fixation still possible with disableURLRewriting enabled

Severity Score

4.3
*CVSS v2

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

-
*SSVC
Descriptions

org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL.

org/apache/catalina/connector/CoyoteAdapter.java en Apache Tomcat 6.0.33 hasta 6.0.37 no considera la configuración disableURLRewriting cuando maneja un ID de sesión en una URL, lo que permite a atacantes remotos realizar ataques de fijación de sesión a través de una URL manipulada.

It was found that previous fixes in Tomcat 6 to path parameter handling introduced a regression that caused Tomcat to not properly disable URL rewriting to track session IDs when the disableURLRewriting option was enabled. A man-in-the-middle attacker could potentially use this flaw to hijack a user's session.

*Credits: N/A
CVSS Scores
Attack Vector
Network
Attack Complexity
Medium
Authentication
None
Confidentiality
Partial
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:-
Exploitation
-
Automatable
-
Tech. Impact
-
* Organization's Worst-case Scenario
Timeline
  • 2013-12-03 CVE Reserved
  • 2014-02-25 CVE Published
  • 2024-02-25 EPSS Updated
  • 2024-08-06 CVE Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-20: Improper Input Validation
  • CWE-384: Session Fixation
CAPEC
References (25)
URL Tag Source
http://seclists.org/fulldisclosure/2014/Dec/23 Mailing List
http://secunia.com/advisories/59036 Third Party Advisory
http://secunia.com/advisories/59722 Third Party Advisory
http://secunia.com/advisories/59873 Third Party Advisory
http://svn.apache.org/viewvc?view=revision&revision=1558822 X_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21675886 X_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21677147 X_refsource_confirm
http://www-01.ibm.com/support/docview.wss?uid=swg21678231 X_refsource_confirm
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html X_refsource_confirm
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html X_refsource_confirm
http://www.securityfocus.com/archive/1/534161/100/0/threaded Mailing List
http://www.securityfocus.com/bid/65769 Vdb Entry
http://www.vmware.com/security/advisories/VMSA-2014-0012.html X_refsource_confirm
https://lists.apache.org/thread.html/37220405a377c0182d2afdbc36461c4783b2930fbeae3a17f1333113%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/39ae1f0bd5867c15755a6f959b271ade1aea04ccdc3b2e639dcd903b%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/b84ad1258a89de5c9c853c7f2d3ad77e5b8b2930be9e132d5cef6b95%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/b8a1bf18155b552dcf9a928ba808cbadad84c236d85eab3033662cfb%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r03c597a64de790ba42c167efacfa23300c3d6c9fe589ab87fe02859c%40%3Cdev.tomcat.apache.org%3E Mailing List
https://lists.apache.org/thread.html/r587e50b86c1a96ee301f751d50294072d142fd6dc08a8987ae9f3a9b%40%3Cdev.tomcat.apache.org%3E Mailing List
URL Date SRC
URL Date SRC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
6.0.33
Search vendor "Apache" for product "Tomcat" and version "6.0.33"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
6.0.34
Search vendor "Apache" for product "Tomcat" and version "6.0.34"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
6.0.35
Search vendor "Apache" for product "Tomcat" and version "6.0.35"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
6.0.36
Search vendor "Apache" for product "Tomcat" and version "6.0.36"
-
Affected
Apache
Search vendor "Apache"
Tomcat
Search vendor "Apache" for product "Tomcat"
6.0.37
Search vendor "Apache" for product "Tomcat" and version "6.0.37"
-
Affected