Site icon API Security Blog

Important: tomcat

**Issue Overview:**

When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. (CVE-2023-28708)

**Affected Packages:**

tomcat

**Issue Correction:**
Run _yum update tomcat_ to update your system.

**New Packages:**

noarch:
    tomcat-7.0.76-10.amzn2.0.3.noarch
    tomcat-admin-webapps-7.0.76-10.amzn2.0.3.noarch
    tomcat-docs-webapp-7.0.76-10.amzn2.0.3.noarch
    tomcat-javadoc-7.0.76-10.amzn2.0.3.noarch
    tomcat-jsvc-7.0.76-10.amzn2.0.3.noarch
    tomcat-jsp-2.2-api-7.0.76-10.amzn2.0.3.noarch
    tomcat-lib-7.0.76-10.amzn2.0.3.noarch
    tomcat-servlet-3.0-api-7.0.76-10.amzn2.0.3.noarch
    tomcat-el-2.2-api-7.0.76-10.amzn2.0.3.noarch
    tomcat-webapps-7.0.76-10.amzn2.0.3.noarch

src:
    tomcat-7.0.76-10.amzn2.0.3.src

### Additional References

Red Hat: [CVE-2023-28708]()

Mitre: [CVE-2023-28708]()Read More

Exit mobile version