-
CVSS Score
-The vulnerability stemmed from RemoteIpFilter's request wrapper improperly handling security state. The XForwardedRequest class had an isSecure() method that returned a local value without updating the request's secure flag, and a setSecure() method that failed to propagate the value. The patches remove isSecure() and modify setSecure() to use request attributes, confirming these were the vulnerable points. These functions would appear in stack traces when processing X-Forwarded-Proto headers and creating session cookies.
| Package Name | Ecosystem | Vulnerable Versions | First Patched Version |
|---|---|---|---|
| org.apache.tomcat:tomcat-catalina | maven | >= 11.0.0-M1, < 11.0.0-M3 | 11.0.0-M3 |
| org.apache.tomcat:tomcat-catalina | maven | >= 10.1.0-M1, < 10.1.6 | 10.1.6 |
| org.apache.tomcat:tomcat-catalina | maven | >= 9.0.0-M1, < 9.0.72 | 9.0.72 |
| org.apache.tomcat:tomcat-catalina | maven | >= 8.5.0, < 8.5.86 | 8.5.86 |