Skip to content

Apache Tomcat Mishandles Character Sequence in Cookies

Moderate severity GitHub Reviewed Published May 1, 2022 to the GitHub Advisory Database • Updated Apr 9, 2025

Package

maven org.apache.tomcat:tomcat (Maven)

Affected versions

>= 6.0.0, <= 6.0.13
>= 5.5.0, <= 5.5.24
>= 5.0.0, <= 5.0.30
>= 4.1.0, <= 4.1.36
>= 3.3.0, <= 3.3.2

Patched versions

None

Description

Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.

References

Published by the National Vulnerability Database Aug 14, 2007
Published to the GitHub Advisory Database May 1, 2022
Reviewed Sep 22, 2023
Last updated Apr 9, 2025

Severity

Moderate

EPSS score

Exploit Prediction Scoring System (EPSS)

This score estimates the probability of this vulnerability being exploited within the next 30 days. Data provided by FIRST.
(99th percentile)

Weaknesses

Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information. Learn more on MITRE.

CVE ID

CVE-2007-3385

GHSA ID

GHSA-6j8f-66vh-39mj

Source code

No known source code
Loading Checking history
See something to contribute? Suggest improvements for this vulnerability.