Apache Tomcat Mishandles Character Sequence in Cookies
Moderate severity
GitHub Reviewed
Published
May 1, 2022
to the GitHub Advisory Database
•
Updated Apr 9, 2025
Package
Affected versions
>= 6.0.0, <= 6.0.13
>= 5.5.0, <= 5.5.24
>= 5.0.0, <= 5.0.30
>= 4.1.0, <= 4.1.36
>= 3.3.0, <= 3.3.2
Patched versions
None
Description
Published by the National Vulnerability Database
Aug 14, 2007
Published to the GitHub Advisory Database
May 1, 2022
Reviewed
Sep 22, 2023
Last updated
Apr 9, 2025
Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the
\"character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.References