Risk | Low |
Patch available | YES |
Number of vulnerabilities | 1 |
CVE-ID | CVE-2023-28708 |
CWE-ID | CWE-614 |
Exploitation vector | Network |
Public exploit | N/A |
Vulnerable software |
SUSE Linux Enterprise Server for SAP Applications 15 Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 SP1 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise Server 15 Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS Operating systems & Components / Operating system SUSE Linux Enterprise High Performance Computing 15 Operating systems & Components / Operating system SUSE CaaS Platform Operating systems & Components / Operating system tomcat-el-3_0-api Operating systems & Components / Operating system package or component tomcat-lib Operating systems & Components / Operating system package or component tomcat-webapps Operating systems & Components / Operating system package or component tomcat-jsp-2_3-api Operating systems & Components / Operating system package or component tomcat-admin-webapps Operating systems & Components / Operating system package or component tomcat Operating systems & Components / Operating system package or component tomcat-servlet-4_0-api Operating systems & Components / Operating system package or component |
Vendor | SUSE |
Security Bulletin
This security bulletin contains one low risk vulnerability.
EUVDB-ID: #VU73957
Risk: Low
CVSSv4.0: 0.5 [CVSS:4.0/AV:N/AC:L/AT:P/PR:N/UI:A/VC:L/VI:L/VA:N/SC:N/SI:N/SA:N/E:U/U:Clear]
CVE-ID: CVE-2023-28708
CWE-ID:
CWE-614 - Sensitive Cookie in HTTPS Session Without 'Secure' Attribute
Exploit availability: No
DescriptionThe vulnerability allows a remote attacker to gain access to sensitive information.
The vulnerability exists due to Apache Tomcat does not set the "Secure" attribute for the JSESSIONID session cookie when using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https. A remote attacker can force the application to transmit cookie via an insecure channel and intercept it.
Update the affected package tomcat to the latest version.
Vulnerable software versionsSUSE Linux Enterprise Server for SAP Applications 15: SP1
SUSE Linux Enterprise Server 15 SP1 LTSS: 15-SP1
SUSE Linux Enterprise Server 15: SP1
SUSE Linux Enterprise High Performance Computing 15 SP1 LTSS: 15-SP1
SUSE Linux Enterprise High Performance Computing 15: SP1
SUSE CaaS Platform: 4.0
tomcat-el-3_0-api: before 9.0.36-150100.4.90.1
tomcat-lib: before 9.0.36-150100.4.90.1
tomcat-webapps: before 9.0.36-150100.4.90.1
tomcat-jsp-2_3-api: before 9.0.36-150100.4.90.1
tomcat-admin-webapps: before 9.0.36-150100.4.90.1
tomcat: before 9.0.36-150100.4.90.1
tomcat-servlet-4_0-api: before 9.0.36-150100.4.90.1
CPE2.3https://www.suse.com/support/update/announcement/2023/suse-su-20231669-1/
Q & A
Can this vulnerability be exploited remotely?
Yes. This vulnerability can be exploited by a remote non-authenticated attacker via the Internet.
Is there known malware, which exploits this vulnerability?
No. We are not aware of malware exploiting this vulnerability.