Vulnerability Details : CVE-2008-0128
The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
Products affected by CVE-2008-0128
- cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:*
Threat overview for CVE-2008-0128
Top countries where our scanners detected CVE-2008-0128
Top open port discovered on systems with this issue
80
IPs affected by CVE-2008-0128 7,598
Threat actors abusing to this issue?
Yes
Find out if you* are
affected by CVE-2008-0128!
*Directly or indirectly through your vendors, service providers and 3rd parties.
Powered by
attack surface intelligence
from SecurityScorecard.
Exploit prediction scoring system (EPSS) score for CVE-2008-0128
4.47%
Probability of exploitation activity in the next 30 days
EPSS Score History
~ 88 %
Percentile, the proportion of vulnerabilities that are scored at or less
CVSS scores for CVE-2008-0128
Base Score | Base Severity | CVSS Vector | Exploitability Score | Impact Score | Score Source | First Seen |
---|---|---|---|---|---|---|
5.0
|
MEDIUM | AV:N/AC:L/Au:N/C:P/I:N/A:N |
10.0
|
2.9
|
NIST |
CWE ids for CVE-2008-0128
-
Assigned by: nvd@nist.gov (Primary)
References for CVE-2008-0128
-
https://exchange.xforce.ibmcloud.com/vulnerabilities/39804
-
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
error - ecx_site - ECX
-
http://www.securityfocus.com/archive/1/500396/100/0/threaded
-
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74@%3Cdev.tomcat.apache.org%3E
svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/-Apache Mail Archives
-
http://www.vupen.com/english/advisories/2008/0192
-
http://www.securityfocus.com/archive/1/500412/100/0/threaded
-
https://lists.apache.org/thread.html/c62b0e3a7bf23342352a5810c640a94b6db69957c5c19db507004d74%40%3Cdev.tomcat.apache.org%3E
svn commit: r1856174 [19/29] - in /tomcat/site/trunk: docs/ xdocs/ xdocs/stylesheets/-Apache Mail Archives
-
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5%40%3Cdev.tomcat.apache.org%3E
Apache Mail Archives
-
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3@%3Cdev.tomcat.apache.org%3E
Apache Mail Archives
-
http://issues.apache.org/bugzilla/show_bug.cgi?id=41217
Patch
-
http://rhn.redhat.com/errata/RHSA-2008-0630.html
RHSA-2008:0630 - Security Advisory - Red Hat Customer Portal
-
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
[security-announce] SUSE Security Summary Report SUSE-SR:2008:005 - openSUSE Security Announce - openSUSE Mailing Lists
-
http://secunia.com/advisories/28549
Vendor Advisory
-
https://lists.apache.org/thread.html/29dc6c2b625789e70a9c4756b5a327e6547273ff8bde7e0327af48c5@%3Cdev.tomcat.apache.org%3E
svn commit: r1855831 [21/30] - in /tomcat/site/trunk: ./ docs/ xdocs/-Apache Mail Archives
-
http://www.debian.org/security/2008/dsa-1468
[SECURITY] [DSA 1468-1] New tomcat5.5 packages fix several vulnerabilities
-
https://lists.apache.org/thread.html/rb71997f506c6cc8b530dd845c084995a9878098846c7b4eacfae8db3%40%3Cdev.tomcat.apache.org%3E
svn commit: r1873980 [24/34] - /tomcat/site/trunk/docs/-Apache Mail Archives
-
http://secunia.com/advisories/31493
About Secunia Research | Flexera
-
http://secunia.com/advisories/29242
About Secunia Research | Flexera
-
http://security-tracker.debian.net/tracker/CVE-2008-0128
-
http://www.vupen.com/english/advisories/2009/0233
Webmail: access your OVH emails on ovhcloud.com | OVHcloud
-
http://www.securityfocus.com/bid/27365
-
http://www.redhat.com/support/errata/RHSA-2008-0261.html
Support
-
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx
Home - Broadcom Community - Discussion Forums, Technical Docs, Ideas and Blogs
-
http://secunia.com/advisories/33668
About Secunia Research | Flexera
-
http://secunia.com/advisories/28552
Vendor Advisory
Jump to