Vulnerability   
Search   
    Search 219043 CVE descriptions
and 99761 test descriptions,
access 10,000+ cross references.
Tests   CVE   All  

Test ID:1.3.6.1.4.1.25623.1.0.141821
Category:Web Servers
Title:Apache Tomcat JK Connector (mod_jk) < 1.2.46 Authentication Bypass Vulnerability - Active Check
Summary:Apache Tomcat JK Connector (mod_jk) is prone to an; authentication bypass vulnerability.
Description:Summary:
Apache Tomcat JK Connector (mod_jk) is prone to an
authentication bypass vulnerability.

Vulnerability Insight:
The Apache Web Server (httpd) specific code that normalised the
requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector
1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported
by Tomcat were exposed via httpd, then it was possible for a specially constructed request to
expose application functionality through the reverse proxy that was not intended for clients
accessing the application via the reverse proxy. It was also possible in some configurations for a
specially constructed request to bypass the access controls configured in httpd. While there is
some overlap between this issue and CVE-2018-1323, they are not identical.

Affected Software/OS:
Apache Tomcat JK Connector (mod_jk) 1.2.0 through 1.2.44.

Solution:
Update to version 1.2.46 or later.

CVSS Score:
5.0

CVSS Vector:
AV:N/AC:L/Au:N/C:P/I:N/A:N

Cross-Ref: Common Vulnerability Exposure (CVE) ID: CVE-2018-11759
CopyrightCopyright (C) 2019 Greenbone Networks GmbH

This is only one of 99761 vulnerability tests in our test suite. Find out more about running a complete security audit.

To run a free test of this vulnerability against your system, register below.




© 1998-2024 E-Soft Inc. All rights reserved.