Announcing Incident Command! The AI powered Next-Gen SIEMLearn more.

vulnerability

Apache Tomcat: Low: Session Fixation (CVE-2015-5346)

Severity
7
CVSS
(AV:N/AC:M/Au:N/C:P/I:P/A:P)
Published
Feb 23, 2016
Added
Feb 23, 2016
Modified
Apr 14, 2025

Description

When recycling the Request object to use for a new request,
the requestedSessionSSL field was not recycled. This meant that
a session ID provided in the next request to be processed using the recycled
Request object could be used when it should not have been. This
gave the client the ability to control the session ID. In theory, this could
have been used as part of a session fixation attack but it would have been
hard to achieve as the attacker would not have been able to force the victim
to use the 'correct' Request object. It was also necessary for
at least one web application to be configured to use the SSL session ID as
the HTTP session ID. This is not a common configuration.

Solution(s)

apache-tomcat-upgrade-7_0_67apache-tomcat-upgrade-8_0_32
Title
NEW

Explore Exposure Command

Confidently identify and prioritize exposures from endpoint to cloud with full attack surface visibility and threat-aware risk context.