Anfälligkeitssuche        Suche in 324607 CVE Beschreibungen
und 145615 Test Beschreibungen,
Zugriff auf 10,000+ Quellverweise.
Tests   CVE   Alle  

Test Kennung:1.3.6.1.4.1.25623.1.0.141821
Kategorie:Web Servers
Titel:Apache Tomcat JK Connector (mod_jk) < 1.2.46 Authentication Bypass Vulnerability - Active Check
Zusammenfassung:Apache Tomcat JK Connector (mod_jk) is prone to an; authentication bypass vulnerability.
Beschreibung:Summary:
Apache Tomcat JK Connector (mod_jk) is prone to an
authentication bypass vulnerability.

Vulnerability Insight:
The Apache Web Server (httpd) specific code that normalised the
requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector
1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported
by Tomcat were exposed via httpd, then it was possible for a specially constructed request to
expose application functionality through the reverse proxy that was not intended for clients
accessing the application via the reverse proxy. It was also possible in some configurations for a
specially constructed request to bypass the access controls configured in httpd. While there is
some overlap between this issue and CVE-2018-1323, they are not identical.

Affected Software/OS:
Apache Tomcat JK Connector (mod_jk) 1.2.0 through 1.2.44.

Solution:
Update to version 1.2.46 or later.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Querverweis: Common Vulnerability Exposure (CVE) ID: CVE-2018-11759
BugTraq ID: 105888
http://www.securityfocus.com/bid/105888
Debian Security Information: DSA-4357 (Google Search)
https://www.debian.org/security/2018/dsa-4357
https://lists.apache.org/thread.html/6d564bb0ab73d6b3efdd1d6b1c075d1a2c84ecd84a4159d6122529ad@%3Cannounce.tomcat.apache.org%3E
https://www.oracle.com/security-alerts/cpujan2020.html
https://lists.debian.org/debian-lts-announce/2018/12/msg00007.html
https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d@%3Cdev.tomcat.apache.org%3E
https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c@%3Cdev.tomcat.apache.org%3E
RedHat Security Advisories: RHSA-2019:0366
https://access.redhat.com/errata/RHSA-2019:0366
RedHat Security Advisories: RHSA-2019:0367
https://access.redhat.com/errata/RHSA-2019:0367
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

Dies ist nur einer von 145615 Anfälligkeitstests in unserem Testpaket. Finden Sie mehr über unsere vollständigen Sicherheitsüberprüfungen heraus.

Um einen gratis Test für diese Anfälligkeit auf Ihrem System durchlaufen zu lassen, registrieren Sie sich bitte unten.




© 1998-2025 E-Soft Inc. Alle Rechte vorbehalten.