CVE-2023-28708: CWE-523 Unprotected Transport of Credentials in Apache Software Foundation Apache Tomcat
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.
AI Analysis
Technical Summary
CVE-2023-28708 is a vulnerability classified under CWE-523 (Unprotected Transport of Credentials) affecting multiple versions of Apache Tomcat, including 8.5.x, 9.0.x, 10.1.x, and early 11.0.x milestone releases. The issue arises when Apache Tomcat is configured with the RemoteIpFilter to handle requests forwarded by a reverse proxy over HTTP, where the X-Forwarded-Proto header is set to 'https'. Under these conditions, Tomcat fails to set the 'secure' attribute on session cookies, which is critical to ensure cookies are only sent over secure HTTPS connections. Without this attribute, user agents (browsers) may transmit session cookies over unencrypted HTTP channels, exposing them to interception by network attackers through man-in-the-middle attacks or passive sniffing. This vulnerability compromises the confidentiality of session tokens, potentially allowing attackers to hijack user sessions. The vulnerability does not affect the integrity or availability of the system and does not require authentication to exploit, but user interaction (sending requests through the reverse proxy) is necessary. The CVSS 3.1 base score is 4.3 (medium severity), reflecting the limited scope and impact. No public exploits have been reported, and the issue primarily affects deployments using reverse proxies that terminate HTTPS but forward requests to Tomcat over HTTP without additional protections. Older, end-of-life versions of Tomcat may also be affected but are not explicitly listed. Mitigation involves ensuring the 'secure' attribute is correctly set on session cookies when HTTPS is used, especially in reverse proxy scenarios.
Potential Impact
For European organizations, this vulnerability poses a risk of session cookie exposure when using Apache Tomcat behind reverse proxies that forward HTTPS traffic as HTTP with the X-Forwarded-Proto header. This can lead to session hijacking, allowing attackers to impersonate legitimate users and access sensitive information or perform unauthorized actions. Sectors with high reliance on web applications—such as finance, healthcare, government, and critical infrastructure—are particularly at risk. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations with strict data protection requirements under GDPR must consider the potential for personal data exposure through session compromise. The vulnerability is more critical in environments where network traffic between the reverse proxy and Tomcat is not fully secured or monitored. However, the absence of known exploits and the medium CVSS score indicate a moderate risk level, especially if mitigations are promptly applied.
Mitigation Recommendations
1. Upgrade Apache Tomcat to the latest stable versions where this issue is fixed or patched. 2. Configure the reverse proxy to use HTTPS for communication with the Tomcat server, ensuring end-to-end encryption. 3. Verify that the 'secure' attribute is set on all session cookies when HTTPS is used, especially in reverse proxy scenarios. 4. Implement strict transport security headers (e.g., HTTP Strict Transport Security - HSTS) to enforce HTTPS usage on clients. 5. Audit and update RemoteIpFilter configurations to correctly recognize and handle forwarded HTTPS requests. 6. Monitor network traffic between reverse proxies and Tomcat servers for unencrypted HTTP sessions carrying sensitive cookies. 7. Consider additional session management controls such as short session lifetimes and multi-factor authentication to reduce the impact of potential session hijacking. 8. Review and update security policies to ensure secure cookie handling practices are enforced across all web applications.
Affected Countries
Germany, France, United Kingdom, Italy, Spain, Netherlands, Belgium, Sweden, Poland, Austria
CVE-2023-28708: CWE-523 Unprotected Transport of Credentials in Apache Software Foundation Apache Tomcat
Description
When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected.
AI-Powered Analysis
Technical Analysis
CVE-2023-28708 is a vulnerability classified under CWE-523 (Unprotected Transport of Credentials) affecting multiple versions of Apache Tomcat, including 8.5.x, 9.0.x, 10.1.x, and early 11.0.x milestone releases. The issue arises when Apache Tomcat is configured with the RemoteIpFilter to handle requests forwarded by a reverse proxy over HTTP, where the X-Forwarded-Proto header is set to 'https'. Under these conditions, Tomcat fails to set the 'secure' attribute on session cookies, which is critical to ensure cookies are only sent over secure HTTPS connections. Without this attribute, user agents (browsers) may transmit session cookies over unencrypted HTTP channels, exposing them to interception by network attackers through man-in-the-middle attacks or passive sniffing. This vulnerability compromises the confidentiality of session tokens, potentially allowing attackers to hijack user sessions. The vulnerability does not affect the integrity or availability of the system and does not require authentication to exploit, but user interaction (sending requests through the reverse proxy) is necessary. The CVSS 3.1 base score is 4.3 (medium severity), reflecting the limited scope and impact. No public exploits have been reported, and the issue primarily affects deployments using reverse proxies that terminate HTTPS but forward requests to Tomcat over HTTP without additional protections. Older, end-of-life versions of Tomcat may also be affected but are not explicitly listed. Mitigation involves ensuring the 'secure' attribute is correctly set on session cookies when HTTPS is used, especially in reverse proxy scenarios.
Potential Impact
For European organizations, this vulnerability poses a risk of session cookie exposure when using Apache Tomcat behind reverse proxies that forward HTTPS traffic as HTTP with the X-Forwarded-Proto header. This can lead to session hijacking, allowing attackers to impersonate legitimate users and access sensitive information or perform unauthorized actions. Sectors with high reliance on web applications—such as finance, healthcare, government, and critical infrastructure—are particularly at risk. The impact is primarily on confidentiality, with no direct effect on system integrity or availability. Organizations with strict data protection requirements under GDPR must consider the potential for personal data exposure through session compromise. The vulnerability is more critical in environments where network traffic between the reverse proxy and Tomcat is not fully secured or monitored. However, the absence of known exploits and the medium CVSS score indicate a moderate risk level, especially if mitigations are promptly applied.
Mitigation Recommendations
1. Upgrade Apache Tomcat to the latest stable versions where this issue is fixed or patched. 2. Configure the reverse proxy to use HTTPS for communication with the Tomcat server, ensuring end-to-end encryption. 3. Verify that the 'secure' attribute is set on all session cookies when HTTPS is used, especially in reverse proxy scenarios. 4. Implement strict transport security headers (e.g., HTTP Strict Transport Security - HSTS) to enforce HTTPS usage on clients. 5. Audit and update RemoteIpFilter configurations to correctly recognize and handle forwarded HTTPS requests. 6. Monitor network traffic between reverse proxies and Tomcat servers for unencrypted HTTP sessions carrying sensitive cookies. 7. Consider additional session management controls such as short session lifetimes and multi-factor authentication to reduce the impact of potential session hijacking. 8. Review and update security policies to ensure secure cookie handling practices are enforced across all web applications.
For access to advanced analysis and higher rate limits, contact root@offseq.com
Technical Details
- Data Version
- 5.1
- Assigner Short Name
- apache
- Date Reserved
- 2023-03-21T17:26:28.837Z
- Cvss Version
- 3.1
- State
- PUBLISHED
Threat ID: 690204523aaa02566521b4d4
Added to database: 10/29/2025, 12:10:58 PM
Last enriched: 11/5/2025, 4:09:12 PM
Last updated: 11/6/2025, 12:34:28 PM
Views: 5
Community Reviews
0 reviewsCrowdsource mitigation strategies, share intel context, and vote on the most helpful responses. Sign in to add your voice and help keep defenders ahead.
Want to contribute mitigation steps or threat intel context? Sign in or create an account to join the community discussion.
Related Threats
Nevada Ransomware Attack Started Months Before It Was Discovered, Per Report
MediumAutomotive IT Firm Hyundai AutoEver Discloses Data Breach
MediumState-Sponsored Hackers Stole SonicWall Cloud Backups in Recent Attack
MediumCVE-2025-11268: CWE-79 Improper Neutralization of Input During Web Page Generation ('Cross-site Scripting') in wpchill Strong Testimonials
MediumCVE-2025-12360: CWE-285 Improper Authorization in codesolz Better Find and Replace – AI-Powered Suggestions
MediumActions
Updates to AI analysis require Pro Console access. Upgrade inside Console → Billing.
Need enhanced features?
Contact root@offseq.com for Pro access with improved analysis and higher rate limits.