Lucene search

K
tomcatApache TomcatTOMCAT:E0E8DE7FA4A562D10AA255736ABC696A
HistoryAug 22, 2023 - 12:00 a.m.

Fixed in Apache Tomcat JK Connector 1.2.49

2023-08-2200:00:00
Apache Tomcat
tomcat.apache.org
13
apache tomcat
jk connector
information disclosure
cve-2023-41081
mod_jk
security constraints

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

61.9%

Important: Information disclosure CVE-2023-41081

In some circumstances, such as when a configuration included JkOptions +ForwardDirectories but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected.

This was fixed with commit 0095b6cb.

This issue was reported to the Tomcat Security Team on 7 July 2023. The issue was made public on 13 September 2023.

Affects: JK 1.2.0-1.2.48 (mod_jk only)

Affected configurations

Vulners
Node
apachetomcat_connectorsRange1.2.0≥
OR
apachetomcat_connectorsRange≤1.2.48
VendorProductVersionCPE
apachetomcat_connectors*cpe:2.3:a:apache:tomcat_connectors:*:*:*:*:*:*:*:*

CVSS3

7.5

Attack Vector

NETWORK

Attack Complexity

LOW

Privileges Required

NONE

User Interaction

NONE

Scope

UNCHANGED

Confidentiality Impact

HIGH

Integrity Impact

NONE

Availability Impact

NONE

CVSS:3.1/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N

EPSS

0.002

Percentile

61.9%