Vulnerability Name:

CVE-2014-0033

Assigned:2013-12-03
Published:2014-02-25
Updated:2017-12-15
Summary:org/apache/catalina/connector/CoyoteAdapter.java in Apache Tomcat 6.0.33 through 6.0.37 does not consider the disableURLRewriting setting when handling a session ID in a URL, which allows remote attackers to conduct session fixation attacks via a crafted URL.
CVSS v3 Severity:5.3 Medium (CCN CVSS v3 Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:N/I:L/A:N)
Exploitability Metrics:Attack Vector (AV): Network
Attack Complexity (AC): Low
Privileges Required (PR): None
User Interaction (UI): None
Scope:Scope (S): Unchanged
Impact Metrics:Confidentiality (C): None
Integrity (I): Low
Availibility (A): None
CVSS v2 Severity:4.3 Medium (CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N)
3.2 Low (Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:P/I:N/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Authentication (Au): None
Impact Metrics:Confidentiality (C): Partial
Integrity (I): None
Availibility (A): None
4.3 Medium (CCN CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N)
3.2 Low (CCN Temporal CVSS v2 Vector: AV:N/AC:M/Au:N/C:N/I:P/A:N/E:U/RL:OF/RC:C)
Exploitability Metrics:Access Vector (AV): Network
Access Complexity (AC): Medium
Athentication (Au): None
Impact Metrics:Confidentiality (C): None
Integrity (I): Partial
Availibility (A): None
Vulnerability Type:CWE-20
References:Source: FULLDISC
Type: UNKNOWN
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities

Source: CONFIRM
Type: UNKNOWN
http://svn.apache.org/viewvc?view=revision&revision=1558822

Source: CONFIRM
Type: VENDOR_ADVISORY
http://tomcat.apache.org/security-6.html

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21675886

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21677147

Source: CONFIRM
Type: UNKNOWN
http://www-01.ibm.com/support/docview.wss?uid=swg21678231

Source: DEBIAN
Type: UNKNOWN
DSA-3530

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpujul2014-1972956.html

Source: CONFIRM
Type: UNKNOWN
http://www.oracle.com/technetwork/topics/security/cpuoct2014-1972960.html

Source: BUGTRAQ
Type: UNKNOWN
20141205 NEW: VMSA-2014-0012 - VMware vSphere product updates address security vulnerabilities

Source: BID
Type: UNKNOWN
65769

Source: UBUNTU
Type: UNKNOWN
USN-2130-1

Source: CONFIRM
Type: UNKNOWN
http://www.vmware.com/security/advisories/VMSA-2014-0012.html

Source: CONFIRM
Type: UNKNOWN
https://bugzilla.redhat.com/show_bug.cgi?id=1069919

Source: XF
Type: UNKNOWN
tomcat-cve20140033-session-hijacking(91423)

Vulnerable Configuration:Configuration 1:
  • cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.34:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.36:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.37:*:*:*:*:*:*:*

  • Configuration CCN 1:
  • cpe:/a:apache:tomcat:6.0.33:*:*:*:*:*:*:*
  • OR cpe:/a:apache:tomcat:6.0.35:*:*:*:*:*:*:*
  • AND
  • cpe:/a:ibm:security_appscan:8.5.0.0:-:enterprise:*:*:*:*:*
  • OR cpe:/a:ibm:rational_policy_tester:8.5.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_directory_server:5.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan:8.6.0.2:-:enterprise:*:*:*:*:*
  • OR cpe:/a:ibm:rational_directory_server:5.2.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_directory_server:5.2.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:openpages_grc_platform:6.2.1.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_directory_server:5.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_directory_server:5.1.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan:8.7.0.0:-:enterprise:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan:8.5:-:standard:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan:8.6:-:standard:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan:8.7:-:standard:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan:8.8:-:standard:*:*:*:*:*
  • OR cpe:/a:ibm:security_appscan:9.0:*:standard:*:*:*:*:*
  • OR cpe:/a:ibm:algo_one:5.0.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.2.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:3.0.1.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.4:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:rational_collaborative_lifecycle_management:4.0.6:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:tivoli_application_dependency_discovery_manager:7.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.0:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.0.1.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.0.1.2:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:urbancode_deploy:6.0.1.3:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:openpages_grc_platform:6.0.1.5:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:openpages_grc_platform:6.1.0.1:*:*:*:*:*:*:*
  • OR cpe:/a:ibm:openpages_grc_platform:7.0.0.1:*:*:*:*:*:*:*

  • Denotes that component is vulnerable
    Oval Definitions
    Definition IDClassTitleLast Modified
    oval:org.cisecurity:def:585
    P
    DSA-3530-1 -- tomcat6 -- security update
    2016-07-01
    oval:org.mitre.oval:def:24367
    P
    USN-2130-1 -- tomcat6, tomcat7 vulnerabilities
    2014-06-30
    oval:com.ubuntu.precise:def:20140033000
    V
    CVE-2014-0033 on Ubuntu 12.04 LTS (precise) - low.
    2014-02-26
    oval:com.ubuntu.trusty:def:20140033000
    V
    CVE-2014-0033 on Ubuntu 14.04 LTS (trusty) - low.
    2014-02-26
    BACK
    apache tomcat 6.0.33
    apache tomcat 6.0.34
    apache tomcat 6.0.35
    apache tomcat 6.0.36
    apache tomcat 6.0.37
    apache tomcat 6.0.33
    apache tomcat 6.0.35
    ibm security appscan 8.5.0.0 -
    ibm rational policy tester 8.5.0.3
    ibm rational directory server 5.2
    ibm security appscan 8.6.0.2 -
    ibm rational directory server 5.2.0.1
    ibm rational directory server 5.2.0.2
    ibm openpages grc platform 6.2.1.0
    ibm rational directory server 5.1.1
    ibm rational directory server 5.1.1.1
    ibm security appscan 8.7.0.0 -
    ibm security appscan 8.5 -
    ibm security appscan 8.6 -
    ibm security appscan 8.7 -
    ibm security appscan 8.8 -
    ibm security appscan 9.0
    ibm algo one 5.0.0
    ibm tivoli application dependency discovery manager 7.2.1
    ibm tivoli application dependency discovery manager 7.2.2
    ibm rational collaborative lifecycle management 3.0.1
    ibm rational collaborative lifecycle management 4.0
    ibm rational collaborative lifecycle management 3.0.1.6
    ibm rational collaborative lifecycle management 4.0.1
    ibm rational collaborative lifecycle management 4.0.2
    ibm rational collaborative lifecycle management 4.0.3
    ibm rational collaborative lifecycle management 4.0.4
    ibm rational collaborative lifecycle management 4.0.5
    ibm rational collaborative lifecycle management 4.0.6
    ibm tivoli application dependency discovery manager 7.1.2
    ibm urbancode deploy 6.0
    ibm urbancode deploy 6.0.1
    ibm urbancode deploy 6.0.1.1
    ibm urbancode deploy 6.0.1.2
    ibm urbancode deploy 6.0.1.3
    ibm openpages grc platform 6.0.1.5
    ibm openpages grc platform 6.1.0.1
    ibm openpages grc platform 7.0.0.1