CVE-2007-5333

N/A Unknown
Published: February 12, 2008 Modified: April 23, 2026
View on NVD

Description

Apache Tomcat 6.0.0 through 6.0.14, 5.5.0 through 5.5.25, and 4.1.0 through 4.1.36 does not properly handle (1) double quote (") characters or (2) %5C (encoded backslash) sequences in a cookie value, which might cause sensitive information such as session IDs to be leaked to remote attackers and enable session hijacking attacks. NOTE: this issue exists because of an incomplete fix for CVE-2007-3385.

AI Explanation

Get an AI-powered plain-language explanation of this vulnerability and remediation steps.

Login to generate AI explanation

References to Advisories, Solutions, and Tools

Patch Vendor Advisory Exploit Third Party Advisory
http://jvn.jp/jp/JVN%2309470767/index.html
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://marc.info/?l=bugtraq&m=139344343412337&w=2
Source: secalert@redhat.com
Mailing List Third Party Advisory
http://secunia.com/advisories/28878
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/28884
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/28915
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/29711
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/30676
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/30802
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/32036
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/32222
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/33330
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/37460
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/44183
Source: secalert@redhat.com
Broken Link
http://secunia.com/advisories/57126
Source: secalert@redhat.com
Broken Link
http://security.gentoo.org/glsa/glsa-200804-10.xml
Source: secalert@redhat.com
Broken Link
http://securityreason.com/securityalert/3636
Source: secalert@redhat.com
Broken Link
http://support.apple.com/kb/HT2163
Source: secalert@redhat.com
Third Party Advisory
http://support.apple.com/kb/HT3216
Source: secalert@redhat.com
Third Party Advisory
http://tomcat.apache.org/security-4.html
Source: secalert@redhat.com
Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: secalert@redhat.com
Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: secalert@redhat.com
Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24018932
Source: secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg27012047
Source: secalert@redhat.com
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg27012048
Source: secalert@redhat.com
Third Party Advisory
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133
Source: secalert@redhat.com
Third Party Advisory
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:018
Source: secalert@redhat.com
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
Source: secalert@redhat.com
Third Party Advisory
http://www.securityfocus.com/archive/1/487822/100/0/threaded
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/27706
Source: secalert@redhat.com
Exploit Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31681
Source: secalert@redhat.com
Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0010.html
Source: secalert@redhat.com
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: secalert@redhat.com
Third Party Advisory
http://www.vupen.com/english/advisories/2008/0488
Source: secalert@redhat.com
URL Repurposed
http://www.vupen.com/english/advisories/2008/1856/references
Source: secalert@redhat.com
URL Repurposed
http://www.vupen.com/english/advisories/2008/1981/references
Source: secalert@redhat.com
URL Repurposed
http://www.vupen.com/english/advisories/2008/2690
Source: secalert@redhat.com
URL Repurposed
http://www.vupen.com/english/advisories/2008/2780
Source: secalert@redhat.com
URL Repurposed
http://www.vupen.com/english/advisories/2009/3316
Source: secalert@redhat.com
URL Repurposed
https://bugzilla.redhat.com/show_bug.cgi?id=532111
Source: secalert@redhat.com
Issue Tracking Third Party Advisory
http://jvn.jp/jp/JVN%2309470767/index.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://lists.apple.com/archives/security-announce/2008//Jun/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.apple.com/archives/security-announce/2008/Oct/msg00001.html
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://lists.opensuse.org/opensuse-security-announce/2009-02/msg00002.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://marc.info/?l=bugtraq&m=139344343412337&w=2
Source: af854a3a-2127-422b-91ae-364da2661108
Mailing List Third Party Advisory
http://secunia.com/advisories/28878
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/28884
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/28915
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/29711
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/30676
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/30802
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/32036
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/32222
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/33330
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/37460
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/44183
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://secunia.com/advisories/57126
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://security.gentoo.org/glsa/glsa-200804-10.xml
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://securityreason.com/securityalert/3636
Source: af854a3a-2127-422b-91ae-364da2661108
Broken Link
http://support.apple.com/kb/HT2163
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://support.apple.com/kb/HT3216
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://tomcat.apache.org/security-4.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tomcat.apache.org/security-5.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://tomcat.apache.org/security-6.html
Source: af854a3a-2127-422b-91ae-364da2661108
Vendor Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg24018932
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg27012047
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-01.ibm.com/support/docview.wss?uid=swg27012048
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20133
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www-1.ibm.com/support/docview.wss?uid=swg1IZ20991
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2009:018
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.mandriva.com/security/advisories?name=MDVSA-2010:176
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.securityfocus.com/archive/1/487822/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/archive/1/507985/100/0/threaded
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/27706
Source: af854a3a-2127-422b-91ae-364da2661108
Exploit Patch Third Party Advisory VDB Entry
http://www.securityfocus.com/bid/31681
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory VDB Entry
http://www.vmware.com/security/advisories/VMSA-2008-0010.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vmware.com/security/advisories/VMSA-2009-0016.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
http://www.vupen.com/english/advisories/2008/0488
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://www.vupen.com/english/advisories/2008/1856/references
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://www.vupen.com/english/advisories/2008/1981/references
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://www.vupen.com/english/advisories/2008/2690
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://www.vupen.com/english/advisories/2008/2780
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
http://www.vupen.com/english/advisories/2009/3316
Source: af854a3a-2127-422b-91ae-364da2661108
URL Repurposed
https://bugzilla.redhat.com/show_bug.cgi?id=532111
Source: af854a3a-2127-422b-91ae-364da2661108
Issue Tracking Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00315.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory
https://www.redhat.com/archives/fedora-package-announce/2008-February/msg00460.html
Source: af854a3a-2127-422b-91ae-364da2661108
Third Party Advisory

110 reference(s) from NVD

Quick Stats

CVSS v3 Score
N/A / 10.0
EPSS (Exploit Probability)
81.6%
99th percentile
Exploitation Status
Not in CISA KEV

Weaknesses (CWE)

Affected Vendors

apache