Free and open-source vulnerability scanner

Mageni eases for you the vulnerability scanning, assessment, and management process. It is free and open-source.

Install Now

Available for macOS, Windows, and Linux

App screenshot

Apache Tomcat Session Fixation Vulnerability (Nov 2012) - Linux

Information

Severity

Severity

Medium

Family

Family

Web Servers

CVSSv2 Base

CVSSv2 Base

6.8

CVSSv2 Vector

CVSSv2 Vector

AV:N/AC:M/Au:N/C:P/I:P/A:P

Solution Type

Solution Type

Vendor Patch

Created

Created

2 years ago

Modified

Modified

2 years ago

Summary

Apache Tomcat is prone to a session fixation vulnerability.

Insight

Insight

java/org/apache/catalina/authenticator/FormAuthenticator.java in the form authentication feature does not properly handle the relationships between authentication requirements and sessions, which allows remote attackers to inject a request into a session by sending this request during completion of the login form, a variant of a session fixation attack.

Affected Software

Affected Software

Apache Tomcat 6.0.21 through 6.0.36 and 7.x before 7.0.33.

Detection Method

Detection Method

Checks if a vulnerable version is present on the target host.

Solution

Solution

Update to version 6.0.37, 7.0.33 or later.

Common Vulnerabilities and Exposures (CVE)