CVE-2007-5333

Scores

EPSS

0.816high81.6%
0%20%40%60%80%100%

Percentile: 81.6%

CVSS

5.0medium2.0
0246810

CVSS Score: 5.0/10

All CVSS Scores

CVSS 2.0
5.0

Vector: AV:N/AC:L/Au:N/C:P/I:N/A:N

Description

Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (“) characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.

Scaner-VS 7 — a modern vulnerability management solution

Uses this database for vulnerability detection. High-speed search, cross-platform, advanced configuration audit, and flexible filtering. Suitable for organizations of any size.
Learn more about Scaner-VS 7

Sources

debiannvdredhatubuntu

CWEs

CWE-200

Exploits

Exploit ID: 31130

Source: exploitdb

URL: https://www.exploit-db.com/exploits/31130

Vulnerable Software (31)

Type: Configuration

Product: ant

Operating System: rhel

Trait:
{  "fixed": "1.6.5-1jpp_1rh"}

Source: redhat

Type: Configuration

Product: avalon-logkit

Operating System: rhel

Trait:
{  "fixed": "1.2-2jpp_4rh"}

Source: redhat

Type: Configuration

Product: axis

Operating System: rhel

Trait:
{  "fixed": "1.2.1-1jpp_3rh"}

Source: redhat

Type: Configuration

Product: classpathx-jaf

Operating System: rhel

Trait:
{  "fixed": "1.0-2jpp_6rh"}

Source: redhat

Type: Configuration

Product: classpathx-mail

Operating System: rhel

Trait:
{  "fixed": "1.1.1-2jpp_8rh"}

Source: redhat

Type: Configuration

Product: geronimo-specs

Operating System: rhel

Trait:
{  "fixed": "1.0-0.M4.1jpp_10rh"}

Source: redhat

Type: Configuration

Product: jakarta-commons-modeler

Operating System: rhel

Trait:
{  "fixed": "2.0-3jpp_2rh"}

Source: redhat

Type: Configuration

Product: log4j

Operating System: rhel

Trait:
{  "fixed": "1.2.12-1jpp_1rh"}

Source: redhat

Type: Configuration

Product: mx4j

Operating System: rhel

Trait:
{  "fixed": "3.0.1-1jpp_4rh"}

Source: redhat

Type: Configuration

Product: pcsc-lite

Operating System: rhel

Trait:
{  "fixed": "1.3.3-3.el4"}

Source: redhat

Type: Configuration

Product: rhpki-ca

Operating System: rhel

Trait:
{  "fixed": "7.3.0-20.el4"}

Source: redhat

Type: Configuration

Product: rhpki-java-tools

Operating System: rhel

Trait:
{  "fixed": "7.3.0-10.el4"}

Source: redhat

Type: Configuration

Product: rhpki-kra

Operating System: rhel

Trait:
{  "fixed": "7.3.0-14.el4"}

Source: redhat

Type: Configuration

Product: rhpki-manage

Operating System: rhel

Trait:
{  "fixed": "7.3.0-19.el4"}

Source: redhat

Type: Configuration

Product: rhpki-native-tools

Operating System: rhel

Trait:
{  "fixed": "7.3.0-6.el4"}

Source: redhat

Type: Configuration

Product: rhpki-ocsp

Operating System: rhel

Trait:
{  "fixed": "7.3.0-13.el4"}

Source: redhat

Type: Configuration

Product: rhpki-tks

Operating System: rhel

Trait:
{  "fixed": "7.3.0-13.el4"}

Source: redhat

Type: Configuration

Product: tomcat5

Operating System: rhel

Trait:
{  "fixed": "5.5.23-1.patch07.19.ep5.el4"}

Source: redhat

Type: Configuration

Product: tomcat5

Operating System: rhel

Trait:
{  "fixed": "5.5.23-0jpp_4rh.16"}

Source: redhat

Type: Configuration

Product: tomcat5

Operating System: rhel

Trait:
{  "fixed": "5.5.23-0jpp_18rh"}

Source: redhat