The SingleSignOn Valve (org.apache.catalina.authenticator.SingleSignOn) in Apache Tomcat before 5.5.21 does not set the secure flag for the JSESSIONIDSSO cookie in an https session, which can cause the cookie to be sent in http requests and make it easier for remote attackers to capture this cookie.
https://exchange.xforce.ibmcloud.com/vulnerabilities/39804
http://www.vupen.com/english/advisories/2009/0233
http://www.vupen.com/english/advisories/2008/0192
http://www.securityfocus.com/bid/27365
http://www.securityfocus.com/archive/1/500412/100/0/threaded
http://www.securityfocus.com/archive/1/500396/100/0/threaded
http://www.redhat.com/support/errata/RHSA-2008-0261.html
http://www.debian.org/security/2008/dsa-1468
http://support.ca.com/irj/portal/anonymous/phpsupcontent?contentID=197540
http://security-tracker.debian.net/tracker/CVE-2008-0128
http://secunia.com/advisories/33668
http://secunia.com/advisories/31493
http://secunia.com/advisories/29242
http://secunia.com/advisories/28552
http://secunia.com/advisories/28549
http://rhn.redhat.com/errata/RHSA-2008-0630.html
http://lists.opensuse.org/opensuse-security-announce/2008-03/msg00001.html
http://issues.apache.org/bugzilla/show_bug.cgi?id=41217
http://community.ca.com/blogs/casecurityresponseblog/archive/2009/01/23.aspx