CVE-2007-5333
Summary
| CVE | CVE-2007-5333 |
|---|---|
| State | PUBLIC |
| Assigner | [email protected] |
| Source Priority | CVE Program / NVD first with legacy fallback |
| Published | 2008-02-12 01:00:00 UTC |
| Updated | 2023-11-07 02:01:00 UTC |
| Description | Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385. |
Risk And Classification
Problem Types: CWE-200
NVD Known Affected Configurations (CPE 2.3)
| Type | Vendor | Product | Version | Update | Edition | Language |
|---|---|---|---|---|---|---|
| Application | Apache | Tomcat | 4.1.10 | All | All | All |
| Application | Apache | Tomcat | 4.1.12 | All | All | All |
| Application | Apache | Tomcat | 4.1.24 | All | All | All |
| Application | Apache | Tomcat | 4.1.3 | beta | All | All |
| Application | Apache | Tomcat | 4.1.31 | All | All | All |
| Application | Apache | Tomcat | 4.1.36 | All | All | All |
| Application | Apache | Tomcat | 4.1.9 | beta | All | All |
| Application | Apache | Tomcat | 5.0.1 | All | All | All |
| Application | Apache | Tomcat | 5.0.10 | All | All | All |
| Application | Apache | Tomcat | 5.0.11 | All | All | All |
| Application | Apache | Tomcat | 5.0.12 | All | All | All |
| Application | Apache | Tomcat | 5.0.13 | All | All | All |
| Application | Apache | Tomcat | 5.0.14 | All | All | All |
| Application | Apache | Tomcat | 5.0.15 | All | All | All |
| Application | Apache | Tomcat | 5.0.16 | All | All | All |
| Application | Apache | Tomcat | 5.0.19 | All | All | All |
| Application | Apache | Tomcat | 5.0.2 | All | All | All |
| Application | Apache | Tomcat | 5.0.28 | All | All | All |
| Application | Apache | Tomcat | 5.0.3 | All | All | All |
| Application | Apache | Tomcat | 5.0.30 | All | All | All |
| Application | Apache | Tomcat | 5.0.4 | All | All | All |
| Application | Apache | Tomcat | 5.0.5 | All | All | All |
| Application | Apache | Tomcat | 5.0.6 | All | All | All |
| Application | Apache | Tomcat | 5.0.7 | All | All | All |
| Application | Apache | Tomcat | 5.0.8 | All | All | All |
| Application | Apache | Tomcat | 5.0.9 | All | All | All |
| Application | Apache | Tomcat | 5.5.1 | All | All | All |
| Application | Apache | Tomcat | 5.5.10 | All | All | All |
| Application | Apache | Tomcat | 5.5.11 | All | All | All |
| Application | Apache | Tomcat | 5.5.12 | All | All | All |
| Application | Apache | Tomcat | 5.5.13 | All | All | All |
| Application | Apache | Tomcat | 5.5.14 | All | All | All |
| Application | Apache | Tomcat | 5.5.15 | All | All | All |
| Application | Apache | Tomcat | 5.5.16 | All | All | All |
| Application | Apache | Tomcat | 5.5.17 | All | All | All |
| Application | Apache | Tomcat | 5.5.18 | All | All | All |
| Application | Apache | Tomcat | 5.5.19 | All | All | All |
| Application | Apache | Tomcat | 5.5.2 | All | All | All |
| Application | Apache | Tomcat | 5.5.20 | All | All | All |
| Application | Apache | Tomcat | 5.5.21 | All | All | All |
| Application | Apache | Tomcat | 5.5.22 | All | All | All |
| Application | Apache | Tomcat | 5.5.23 | All | All | All |
| Application | Apache | Tomcat | 5.5.24 | All | All | All |
| Application | Apache | Tomcat | 5.5.25 | All | All | All |
| Application | Apache | Tomcat | 5.5.3 | All | All | All |
| Application | Apache | Tomcat | 5.5.4 | All | All | All |
| Application | Apache | Tomcat | 5.5.5 | All | All | All |
| Application | Apache | Tomcat | 5.5.6 | All | All | All |
| Application | Apache | Tomcat | 5.5.7 | All | All | All |
| Application | Apache | Tomcat | 5.5.8 | All | All | All |
| Application | Apache | Tomcat | 5.5.9 | All | All | All |
| Application | Apache | Tomcat | 6.0 | All | All | All |
| Application | Apache | Tomcat | 6.0.1 | All | All | All |
| Application | Apache | Tomcat | 6.0.10 | All | All | All |
| Application | Apache | Tomcat | 6.0.11 | All | All | All |
| Application | Apache | Tomcat | 6.0.12 | All | All | All |
| Application | Apache | Tomcat | 6.0.13 | All | All | All |
| Application | Apache | Tomcat | 6.0.14 | All | All | All |
| Application | Apache | Tomcat | 6.0.15 | All | All | All |
| Application | Apache | Tomcat | 6.0.2 | All | All | All |
| Application | Apache | Tomcat | 6.0.3 | All | All | All |
| Application | Apache | Tomcat | 6.0.4 | All | All | All |
| Application | Apache | Tomcat | 6.0.5 | All | All | All |
| Application | Apache | Tomcat | 6.0.6 | All | All | All |
| Application | Apache | Tomcat | 6.0.7 | All | All | All |
| Application | Apache | Tomcat | 6.0.8 | All | All | All |
| Application | Apache | Tomcat | 6.0.9 | All | All | All |
| Application | Apache | Tomcat | 4.1.10 | All | All | All |
| Application | Apache | Tomcat | 4.1.12 | All | All | All |
| Application | Apache | Tomcat | 4.1.24 | All | All | All |
| Application | Apache | Tomcat | 4.1.3 | beta | All | All |
| Application | Apache | Tomcat | 4.1.31 | All | All | All |
| Application | Apache | Tomcat | 4.1.36 | All | All | All |
| Application | Apache | Tomcat | 4.1.9 | beta | All | All |
| Application | Apache | Tomcat | 5.0.1 | All | All | All |
| Application | Apache | Tomcat | 5.0.10 | All | All | All |
| Application | Apache | Tomcat | 5.0.11 | All | All | All |
| Application | Apache | Tomcat | 5.0.12 | All | All | All |
| Application | Apache | Tomcat | 5.0.13 | All | All | All |
| Application | Apache | Tomcat | 5.0.14 | All | All | All |
| Application | Apache | Tomcat | 5.0.15 | All | All | All |
| Application | Apache | Tomcat | 5.0.16 | All | All | All |
| Application | Apache | Tomcat | 5.0.19 | All | All | All |
| Application | Apache | Tomcat | 5.0.2 | All | All | All |
| Application | Apache | Tomcat | 5.0.28 | All | All | All |
| Application | Apache | Tomcat | 5.0.3 | All | All | All |
| Application | Apache | Tomcat | 5.0.30 | All | All | All |
| Application | Apache | Tomcat | 5.0.4 | All | All | All |
| Application | Apache | Tomcat | 5.0.5 | All | All | All |
| Application | Apache | Tomcat | 5.0.6 | All | All | All |
| Application | Apache | Tomcat | 5.0.7 | All | All | All |
| Application | Apache | Tomcat | 5.0.8 | All | All | All |
| Application | Apache | Tomcat | 5.0.9 | All | All | All |
| Application | Apache | Tomcat | 5.5.1 | All | All | All |
| Application | Apache | Tomcat | 5.5.10 | All | All | All |
| Application | Apache | Tomcat | 5.5.11 | All | All | All |
| Application | Apache | Tomcat | 5.5.12 | All | All | All |
| Application | Apache | Tomcat | 5.5.13 | All | All | All |
| Application | Apache | Tomcat | 5.5.14 | All | All | All |
| Application | Apache | Tomcat | 5.5.15 | All | All | All |
| Application | Apache | Tomcat | 5.5.16 | All | All | All |
| Application | Apache | Tomcat | 5.5.17 | All | All | All |
| Application | Apache | Tomcat | 5.5.18 | All | All | All |
| Application | Apache | Tomcat | 5.5.19 | All | All | All |
| Application | Apache | Tomcat | 5.5.2 | All | All | All |
| Application | Apache | Tomcat | 5.5.20 | All | All | All |
| Application | Apache | Tomcat | 5.5.21 | All | All | All |
| Application | Apache | Tomcat | 5.5.22 | All | All | All |
| Application | Apache | Tomcat | 5.5.23 | All | All | All |
| Application | Apache | Tomcat | 5.5.24 | All | All | All |
| Application | Apache | Tomcat | 5.5.25 | All | All | All |
| Application | Apache | Tomcat | 5.5.3 | All | All | All |
| Application | Apache | Tomcat | 5.5.4 | All | All | All |
| Application | Apache | Tomcat | 5.5.5 | All | All | All |
| Application | Apache | Tomcat | 5.5.6 | All | All | All |
| Application | Apache | Tomcat | 5.5.7 | All | All | All |
| Application | Apache | Tomcat | 5.5.8 | All | All | All |
| Application | Apache | Tomcat | 5.5.9 | All | All | All |
| Application | Apache | Tomcat | 6.0 | All | All | All |
| Application | Apache | Tomcat | 6.0.1 | All | All | All |
| Application | Apache | Tomcat | 6.0.10 | All | All | All |
| Application | Apache | Tomcat | 6.0.11 | All | All | All |
| Application | Apache | Tomcat | 6.0.12 | All | All | All |
| Application | Apache | Tomcat | 6.0.13 | All | All | All |
| Application | Apache | Tomcat | 6.0.14 | All | All | All |
| Application | Apache | Tomcat | 6.0.15 | All | All | All |
| Application | Apache | Tomcat | 6.0.2 | All | All | All |
| Application | Apache | Tomcat | 6.0.3 | All | All | All |
| Application | Apache | Tomcat | 6.0.4 | All | All | All |
| Application | Apache | Tomcat | 6.0.5 | All | All | All |
| Application | Apache | Tomcat | 6.0.6 | All | All | All |
| Application | Apache | Tomcat | 6.0.7 | All | All | All |
| Application | Apache | Tomcat | 6.0.8 | All | All | All |
| Application | Apache | Tomcat | 6.0.9 | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache | Tomcat | All | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.32 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.34 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.37 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.0 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.1 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.2 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.3 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.4 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.5 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.32 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.34 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 4.1.37 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.0 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.1 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.2 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.3 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.4 | All | All | All |
| Application | Apache Software Foundation | Tomcat | 5.5 | All | All | All |
References
| Reference | Source | Link | Tags |
|---|---|---|---|
| Pony Mail! | MISC | lists.apache.org | |
| Pony Mail! | MISC | lists.apache.org | |
| About the security content of Security Update 2008-004 and Mac OS X 10.5.4 | CONFIRM | support.apple.com | |
| Apache Tomcat Multiple Vulnerabilities - Advisories - Secunia | SECUNIA | secunia.com | |
| VMware Products Update for Multiple Packages - Secunia Advisories - Vulnerability Information - Secunia.com | SECUNIA | secunia.com | |
| About Secunia Research | Flexera | SECUNIA | secunia.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| [SECURITY] Fedora 7 Update: tomcat5-5.5.26-1jpp.2.fc7 | FEDORA | www.redhat.com | |
| Support / Security / Advisories / / MDVSA-2009:018 | Mandriva | MANDRIVA | www.mandriva.com | |
| IBM notice: The page you requested cannot be displayed | CONFIRM | www-01.ibm.com | |
| APPLE-SA-2008-06-30 Security Update 2008-004 and Mac OS X v10.5.4 | APPLE | lists.apple.com | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Pony Mail! | MISC | lists.apache.org | |
| SecurityFocus | BUGTRAQ | www.securityfocus.com | |
| Apple Mac OS X Security Update Fixes Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| Bug 532111 – Tracker bug for the EAP 4.2.0.cp08 release for RHEL-5. | CONFIRM | bugzilla.redhat.com | |
| BlackBerry Enterprise Server Multiple Vulnerabilities - Secunia.com | SECUNIA | secunia.com | |
| RETIRED: Apple Mac OS X 2008-007 Multiple Security Vulnerabilities | BID | www.securityfocus.com | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| IBM Tivoli Netcool/Webtop Tomcat Vulnerability - Secunia.com | SECUNIA | secunia.com | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Apple Mac OS X Security Update Fixes Multiple Vulnerabilities - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Product Documentation - Red Hat Customer Portal | CONFIRM | www.redhat.com | |
| Fedora update for tomcat5 - Advisories - Secunia | SECUNIA | secunia.com | |
| About Security Update 2008-007 | CONFIRM | support.apple.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| VMware ESX Server update for Tomcat and Java JRE - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Pony Mail! | MISC | lists.apache.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MISC | lists.apache.org | |
| Apache Tomcat Cookie Handling Session ID Disclosure - Advisories - Secunia | SECUNIA | secunia.com | |
| Webmail - OVH | VUPEN | www.vupen.com | |
| Apache Tomcat® - Apache Tomcat 4.x vulnerabilities | CONFIRM | tomcat.apache.org | |
| IBM notice: The page you requested cannot be displayed | AIXAPAR | www-1.ibm.com | |
| JVN#09470767: Apache Tomcat において不正な Cookie を送信される脆弱性 | JVN | jvn.jp | |
| Apache Tomcat - Apache Tomcat 5 vulnerabilities | CONFIRM | tomcat.apache.org | |
| IBM notice: The page you requested cannot be displayed | CONFIRM | www-01.ibm.com | |
| APPLE-SA-2008-10-09 Security Update 2008-007 | APPLE | lists.apple.com | |
| Security Advisories | Mandriva Linux | MANDRIVA | www.mandriva.com | |
| [security-announce] SUSE Security Summary Report: SUSE-SR:2009:004 | SUSE | lists.opensuse.org | |
| Pony Mail! | MISC | lists.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| Pony Mail! | MISC | lists.apache.org | |
| Apache Tomcat Cookie Quote Handling Remote Information Disclosure Vulnerability | BID | www.securityfocus.com | Exploit, Patch |
| IBM notice: The page you requested cannot be displayed | AIXAPAR | www-1.ibm.com | |
| Repository / Oval Repository | OVAL | oval.cisecurity.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| VMSA-2009-0016.1 | CONFIRM | www.vmware.com | |
| SecurityReason - Tomcat Cookie handling vulnerabilities | SREASON | securityreason.com | |
| IBM notice: The page you requested cannot be displayed | CONFIRM | www-01.ibm.com | |
| Gentoo update for tomcat - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| Tivoli Netcool/Webtop Security Issue and Information Disclosure Vulnerability - Secunia Advisories - Vulnerability Intelligence - Secunia.com | SECUNIA | secunia.com | |
| '[security bulletin] HPSBST02955 rev.1 - HP XP P9000 Performance Advisor Software, 3rd party Software' - MARC | HP | marc.info | |
| [SECURITY] Fedora 8 Update: tomcat5-5.5.26-1jpp.2.fc8 | FEDORA | www.redhat.com | |
| VMSA-2008-0010.3 - VMware | CONFIRM | www.vmware.com | |
| Tomcat: Multiple vulnerabilities — Gentoo Linux Documentation | GENTOO | security.gentoo.org | |
| Webmail : Solution de messagerie professionnelle - OVHcloud- OVH | VUPEN | www.vupen.com | |
| Apache Tomcat® - Apache Tomcat 6 vulnerabilities | CONFIRM | tomcat.apache.org | |
| Pony Mail! | MLIST | lists.apache.org | |
| JVN:JVN#09470767 | MITRE | jvn.jp | |
| CVE Program record | CVE.ORG | www.cve.org | canonical |
| NVD vulnerability detail | NVD | nvd.nist.gov | canonical, analysis |
Vendor Comments And Credit
| Organization | Published | Contributor | Statement |
|---|---|---|---|
| Red Hat | 2008-04-24 | Mark J Cox | Red Hat is aware of this issue and is tracking it via the following bug: https://bugzilla.redhat.com/bugzilla/show_bug.cgi?id=CVE-2007-5333 The Red Hat Security Response Team has rated this issue as having low security impact, a future update may address this flaw. |
There are currently no legacy QID mappings associated with this CVE.