security.snyk.io
Open in
urlscan Pro
2600:1408:c400:1594::ecd
Public Scan
Submitted URL: https://email.snyk.io/c/eJyUkMtu6jAURb_Gnlw5co6PbTLwICTkvsRDBVF1aDtOiUhCFAIVf19BEQNG7dTeW2ft5W3b2_q9M0RPCUBn20AAiEgJwG...
Effective URL: https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-3369687
Submission: On August 01 via api from US — Scanned from US
Effective URL: https://security.snyk.io/vuln/SNYK-JAVA-ORGAPACHETOMCATEMBED-3369687
Submission: On August 01 via api from US — Scanned from US
Form analysis
0 forms found in the DOMText Content
Developer Tools * Snyk Learn * Snyk Advisor * Code Checker About Snyk 1. Snyk Vulnerability Database 2. Maven 3. org.apache.tomcat.embed:tomcat-embed-core UNPROTECTED TRANSPORT OF CREDENTIALS AFFECTING ORG.APACHE.TOMCAT.EMBED:TOMCAT-EMBED-CORE PACKAGE, VERSIONS [8.5.0,8.5.86) [9.0.0-M1,9.0.72) [10.1.0-M1,10.1.6) [11.0.0-M1,11.0.0-M3) -------------------------------------------------------------------------------- SEVERITY Recommended 5.3 medium 0 10 CVSS ASSESSMENT MADE BY SNYK'S SECURITY TEAM Learn more THREAT INTELLIGENCE EPSS 0.09% (41st percentile) Do your applications use this vulnerable package? In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes. Test your applications * Snyk ID SNYK-JAVA-ORGAPACHETOMCATEMBED-3369687 * published 23 Mar 2023 * disclosed 22 Mar 2023 * credit Unknown Report a new vulnerability Found a mistake? INTRODUCED: 22 MAR 2023 CVE-2023-28708 Open this link in a new tab CWE-523 Open this link in a new tab Share HOW TO FIX? Upgrade org.apache.tomcat.embed:tomcat-embed-core to version 8.5.86, 9.0.72, 10.1.6, 11.0.0-M3 or higher. OVERVIEW org.apache.tomcat.embed:tomcat-embed-core is a Core Tomcat implementation. Affected versions of this package are vulnerable to Unprotected Transport of Credentials when using the RemoteIpFilter with requests received from a reverse proxy via HTTP, in which the X-Forwarded-Proto header is set to https. Session cookies do not include the secure attribute, so the user agent may transmit the session cookie over an insecure channel. REFERENCES * Apache Bug Report * Apache Mailing List * Apache Tomcat Advisory * Apache Tomcat Advisory * Apache Tomcat Advisory * Apache Tomcat Advisory * GitHub Commit * GitHub Commit * GitHub Commit * GitHub Commit CVSS SCORES version 3.1 Expand this section SNYK 5.3 medium * Attack Vector (AV) Network * Attack Complexity (AC) Low * Privileges Required (PR) None * User Interaction (UI) None * Scope (S) Unchanged * Confidentiality (C) Low * Integrity (I) None * Availability (A) None Expand this section NVD 4.3 medium Expand this section SUSE 7.5 high Expand this section RED HAT 4.3 medium PRODUCT * Snyk Open Source * Snyk Code * Snyk Container * Snyk Infrastructure as Code * Test with Github * Test with CLI RESOURCES * Vulnerability DB * Documentation * Disclosed Vulnerabilities * Blog * FAQs COMPANY * About * Jobs * Contact * Policies * Do Not Sell My Personal Information CONTACT US * Support * Report a new vuln * Press Kit * Events FIND US ONLINE * * * * TRACK OUR DEVELOPMENT * * © 2024 Snyk Limited Registered in England and Wales. Company number: 09677925 Registered address: Highlands House, Basingstoke Road, Spencers Wood, Reading, Berkshire, RG7 1NT.