JVN#09470767
			Apache Tomcat fails to properly handle cookie value
						
							
						
						
			
			Overview
Apache Tomcat from the Apache Software Foundation contains a vulnerability that could allow a remote attacker to coerce a crafted cookie to a user's web browser.
Products Affected
- Apache Tomcat 4.1.0 through 4.1.36
- Apache Tomcat 5.5.0 through 5.5.25
- Apache Tomcat 6.0.0 through 6.0.14
Description
						
							
								Apache Tomcat from the Apache Software Foundation is a web container that implements both Java Servlets and JavaServer Pages.
Apache Tomcat from the Apache Software Foundation contains a vulnerability that could allow a remote attacker to coerce a crafted cookie to a user's web browser.
The developer reports that this issue exists because of an incomplete fix for CVE-2007-3385.
							
						
					
Impact
A remote attacker could send a crafted cookie to a user's web browser, which may result in session hijacking.
Solution
										
						
							
							Update the Software
						
						
							
								For Apache Tomcat 6.0.x or Apache Tomcat 5.5.x:
Update the software to the latest version according to the information released by the developer.
For Apache Tomcat 4.1.x:
As of February 8, 2008, the Apache Tomcat Project has not yet released the latest version resolving the vulnerability. They report that they will release Apache Tomcat 4.1.37 soon.
For more information, refer to the developer's website.
							
						
					
					
Vendor Status
| Vendor | Status | Last Update | Vendor Notes | 
|---|---|---|---|
| Hitachi | Not Vulnerable | 2008/02/12 | |
| NEC Corporation | Not Vulnerable | 2008/02/26 | 
References
JPCERT/CC Addendum
Vulnerability Analysis by JPCERT/CC
Analyzed on 2008.02.12
| Measures | Conditions | Severity | 
|---|---|---|
| Access Required | Routed - can be attacked over the Internet using packets | 
 | 
| Authentication | None - anonymous or no authentication (IP addresses do not count) | 
 | 
| User Interaction Required | Simple - the user must be convinced to take a standard action that does not feel harmful to most users, such as click on a link or view a file | 
 | 
| Exploit Complexity | Low - little to no expertise and/or luck required to exploit (cross-site scripting) | 
 | 
Credit
					Yoshihiro Ishikawa of LAC Co., Ltd. reported this vulnerability to IPA. 
JPCERT/CC coordinated with the vendors under Information Security Early Warning Partnership.
					
Other Information
| JPCERT Alert | |
| JPCERT Reports | |
| CERT Advisory | |
| CPNI Advisory | |
| TRnotes | |
| CVE | CVE-2007-5333 | 
| JVN iPedia | JVNDB-2008-000009 | 

