First published: Mon Mar 12 2018(Updated: )
The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.
Credit: security@apache.org
Affected Software | Affected Version | How to fix |
---|---|---|
redhat/JK | <1.2.43 | 1.2.43 |
Apache Tomcat JK Connector | >=1.2.0<=1.2.42 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
The vulnerability ID for this vulnerability is CVE-2018-1323.
The severity of CVE-2018-1323 is high with a severity value of 7.5.
The affected software for CVE-2018-1323 is Apache Tomcat JK ISAPI Connector version 1.2.0 to 1.2.42.
To fix CVE-2018-1323, update the Apache Tomcat JK ISAPI Connector to version 1.2.43.
More information about CVE-2018-1323 can be found at the following references: http://tomcat.apache.org/security-jk.html#Fixed_in_Apache_Tomcat_JK_Connector_1.2.43, http://svn.apache.org/viewvc?view=revision&revision=1825658, https://access.redhat.com/errata/RHSA-2018:1843.