Protect yourself against future threats.
-----BEGIN PGP SIGNED MESSAGE----- Hash: SHA256 =========================================================================== AUSCERT External Security Bulletin Redistribution ESB-2023.1789 CVE-2023-28708 Apache Tomcat - Information Disclosure 24 March 2023 =========================================================================== AusCERT Security Bulletin Summary --------------------------------- Product: Apache Tomcat Publisher: Apache Operating System: UNIX variants (UNIX, Linux, OSX) Windows Resolution: Patch/Upgrade CVE Names: CVE-2023-28708 Original Bulletin: https://lists.apache.org/thread/yor1fqsr5jkzwndj1rmrxcw2yc13vo8l Comment: CVSS (Max): None available when published - --------------------------BEGIN INCLUDED TEXT-------------------- CVE-2023-28708 Apache Tomcat - Information Disclosure Severity: Important Vendor: The Apache Software Foundation Versions Affected: Apache Tomcat 11.0.0-M1 to 11.0.0-M2 Apache Tomcat 10.1.0-M1 to 10.1.5 Apache Tomcat 9.0.0-M1 to 9.0.71 Apache Tomcat 8.5.0 to 8.5.85 Description: When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Tomcat did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Mitigation: Users of the affected versions should apply one of the following mitigations: - - Upgrade to Apache Tomcat 11.0.0-M3 or later - - Upgrade to Apache Tomcat 10.1.6 or later - - Upgrade to Apache Tomcat 9.0.72 or later - - Upgrade to Apache Tomcat 8.5.86 or later History: 2023-03-22 Original advisory References: [1] https://tomcat.apache.org/security-11.html [2] https://tomcat.apache.org/security-10.html [3] https://tomcat.apache.org/security-9.html [4] https://tomcat.apache.org/security-8.html - --------------------------END INCLUDED TEXT-------------------- You have received this e-mail bulletin as a result of your organisation's registration with AusCERT. The mailing list you are subscribed to is maintained within your organisation, so if you do not wish to continue receiving these bulletins you should contact your local IT manager. If you do not know who that is, please send an email to auscert@auscert.org.au and we will forward your request to the appropriate person. NOTE: Third Party Rights This security bulletin is provided as a service to AusCERT's members. As AusCERT did not write the document quoted above, AusCERT has had no control over its content. The decision to follow or act on information or advice contained in this security bulletin is the responsibility of each user or organisation, and should be considered in accordance with your organisation's site policies and procedures. AusCERT takes no responsibility for consequences which may arise from following or acting on information or advice contained in this security bulletin. NOTE: This is only the original release of the security bulletin. It may not be updated when updates to the original are made. If downloading at a later date, it is recommended that the bulletin is retrieved directly from the author's website to ensure that the information is still current. Contact information for the authors of the original document is included in the Security Bulletin above. If you have any questions or need further information, please contact them directly. Previous advisories and external security bulletins can be retrieved from: https://www.auscert.org.au/bulletins/ =========================================================================== Australian Computer Emergency Response Team The University of Queensland Brisbane Qld 4072 Internet Email: auscert@auscert.org.au Facsimile: (07) 3365 7031 Telephone: (07) 3365 4417 (International: +61 7 3365 4417) AusCERT personnel answer during Queensland business hours which are GMT+10:00 (AEST). On call after hours for member emergencies only. =========================================================================== -----BEGIN PGP SIGNATURE----- Comment: https://auscert.org.au/gpg-key/ iQIVAwUBZB0rsckNZI30y1K9AQiPlw/9FpRbPzGE7ZukVhih6SkdU/2L/MvFilwF OCC47cCF0QO+k479266HdY9wm+ywYJ7DDiSOZCn9ZCNVIMeSEhUXKW+z9Js9rfM+ VlMww6SAVCWwSugKD+EDc+ocue29SCX+NC3VXBSNBALgw94uCXisVjg93Rgo+NRQ cHbOqTzhKjWX5qJ42owGlshqUYztHtN8o84xW8PpGM20lH6JK9MK1BKcPTjqnTyR JWAtOykvmb9v7m5GNXL9sqon5JfuycGPhvivXn1aYpx9KPqw5RKJ/woyqQGAL9Q0 RrWFvSiHDOg7K+AGHanRBUN865xqjjULBQ6Vztmo+TJdmowoV0gCck82/8poY5tB m2N9M2CgRWWJ6OgXVPIUJj80/o0ItlZBiucWyPV/x9aSTAhT6CB9m1OuGjHyI7wl 8odYbY8l1Svi7pVS40CJT+Us85eHZOaIn5FGtQhCjf1VCBQNYaz46zX/LZjlpbXn WM/lTrT8TwymaNEKn7zVOgwUspEzFWBhC8jecU1iMnPY0IZzI3QRk+26sOqHrMjV ovB/VbXxVAr0Fp9IfreXOtzOxQlZmuJkGvlqgeG5sSvosr7iBg+ybQfqBO+SbaBO Opu2sxAIqPpREdWJvCvTO6MNu7+eaUc2zWPjqTH7OoJ8JRc+QDuf+3jw0DP6eozj V22BYq0hNYE= =l8FV -----END PGP SIGNATURE-----