CVE-2007-3385

N/A Unknown
Published: August 14, 2007 Modified: April 23, 2026
View on NVD

Description

Apache Tomcat 6.0.0 to 6.0.13, 5.5.0 to 5.5.24, 5.0.0 to 5.0.30, 4.1.0 to 4.1.36, and 3.3 to 3.3.2 does not properly handle the \" character sequence in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://secunia.com/advisories/26466
Source: secalert@redhat.com
http://secunia.com/advisories/26898
Source: secalert@redhat.com
http://secunia.com/advisories/27037
Source: secalert@redhat.com
http://secunia.com/advisories/27267
Source: secalert@redhat.com
http://secunia.com/advisories/27727
Source: secalert@redhat.com
http://secunia.com/advisories/28317
Source: secalert@redhat.com
http://secunia.com/advisories/28361
Source: secalert@redhat.com
http://secunia.com/advisories/29242
Source: secalert@redhat.com
http://secunia.com/advisories/30802
Source: secalert@redhat.com
http://secunia.com/advisories/33668
Source: secalert@redhat.com
http://secunia.com/advisories/36486
Source: secalert@redhat.com
http://secunia.com/advisories/44183
Source: secalert@redhat.com
http://securitytracker.com/id?1018557
Source: secalert@redhat.com
http://support.apple.com/kb/HT2163
Source: secalert@redhat.com
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
http://www.kb.cert.org/vuls/id/993544
Source: secalert@redhat.com
Patch US Government Resource
http://www.securityfocus.com/bid/25316
Source: secalert@redhat.com
http://secunia.com/advisories/26466
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/26898
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27037
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27267
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/27727
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/28317
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/28361
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/29242
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/30802
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/33668
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/36486
Source: af854a3a-2127-422b-91ae-364da2661108
http://secunia.com/advisories/44183
Source: af854a3a-2127-422b-91ae-364da2661108
http://securityreason.com/securityalert/3011
Source: af854a3a-2127-422b-91ae-364da2661108
http://securitytracker.com/id?1018557
Source: af854a3a-2127-422b-91ae-364da2661108
http://support.apple.com/kb/HT2163
Source: af854a3a-2127-422b-91ae-364da2661108
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www-01.ibm.com/support/docview.wss?uid=swg1IZ55562
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1447
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.debian.org/security/2008/dsa-1453
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.kb.cert.org/vuls/id/993544
Source: af854a3a-2127-422b-91ae-364da2661108
Patch US Government Resource
http://www.mandriva.com/security/advisories?name=MDKSA-2007:241
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0871.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2007-0950.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0195.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.redhat.com/support/errata/RHSA-2008-0261.html
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/476444/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/500396/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/archive/1/500412/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.securityfocus.com/bid/25316
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/2902
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3386
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2007/3527
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2008/1981/references
Source: af854a3a-2127-422b-91ae-364da2661108
http://www.vupen.com/english/advisories/2009/0233
Source: af854a3a-2127-422b-91ae-364da2661108
https://exchange.xforce.ibmcloud.com/vulnerabilities/35999
Source: af854a3a-2127-422b-91ae-364da2661108

102 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
81.4%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache