When using the RemoteIpFilter with requests received from a    reverse proxy via HTTP that include the X-Forwarded-Proto    header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel.
Older, EOL versions may also be affected.
                
            References
                    | Link | Resource | 
|---|---|
| https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67 | Mailing List Patch Vendor Advisory | 
| https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67 | Mailing List Patch Vendor Advisory | 
Configurations
                    Configuration 1 (hide)
| 
 | 
History
                    07 Aug 2025, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | (en) When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. Older, EOL versions may also be affected. | 
21 Nov 2024, 07:55
| Type | Values Removed | Values Added | 
|---|---|---|
| References | () https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67 - Mailing List, Patch, Vendor Advisory | 
07 Nov 2023, 04:10
| Type | Values Removed | Values Added | 
|---|---|---|
| Summary | When using the RemoteIpFilter with requests received from a reverse proxy via HTTP that include the X-Forwarded-Proto header set to https, session cookies created by Apache Tomcat 11.0.0-M1 to 11.0.0.-M2, 10.1.0-M1 to 10.1.5, 9.0.0-M1 to 9.0.71 and 8.5.0 to 8.5.85 did not include the secure attribute. This could result in the user agent transmitting the session cookie over an insecure channel. | 
27 Mar 2023, 15:26
| Type | Values Removed | Values Added | 
|---|---|---|
| CPE | cpe:2.3:a:apache:tomcat:*:*:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone1:*:*:*:*:*:* cpe:2.3:a:apache:tomcat:11.0.0:milestone2:*:*:*:*:*:* | |
| CVSS | v2 : v3 : | v2 : unknown v3 : 4.3 | 
| References | (MISC) https://lists.apache.org/thread/hdksc59z3s7tm39x0pp33mtwdrt8qr67 - Mailing List, Patch, Vendor Advisory | |
| First Time | Apache tomcat Apache | 
22 Mar 2023, 11:15
| Type | Values Removed | Values Added | 
|---|---|---|
| New CVE | 
Information
                Published : 2023-03-22 11:15
Updated : 2025-08-07 11:15
NVD link : CVE-2023-28708
Mitre link : CVE-2023-28708
CVE.ORG link : CVE-2023-28708
JSON object : View
Products Affected
                apache
- tomcat
CWE
                
                    
                        
                        CWE-523
                        
            Unprotected Transport of Credentials
