First published: Fri Mar 13 2009(Updated: )
An issue with mod_jk 1.2.26, and possibly older versions, allows one user to see another user's information due to missing logic where faulty clients set Content-Length without providing data, or if a user submits too many times very fast. The relevant changelog entry in mod_jk 1.2.27 that corrects the issue is: "AJP13: Always send initial POST packet even if the client disconnected after sending request but before providing POST data. In that case or in case the client broke the connection in a middle of read send an zero size packet informing container about broken client connection. (mturk)" from <a href="http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html">http://tomcat.apache.org/connectors-doc/miscellaneous/changelog.html</a>
Affected Software | Affected Version | How to fix |
---|---|---|
Apache Mod IMAP | <1.2.27 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
REDHAT-BUG-490201 is considered a medium severity vulnerability due to potential information leakage between users.
To fix REDHAT-BUG-490201, upgrade Apache mod_jk to version 1.2.27 or later.
REDHAT-BUG-490201 affects Apache mod_jk versions prior to 1.2.27.
REDHAT-BUG-490201 addresses an information disclosure issue caused by improper content length handling.
Yes, versions of mod_jk older than 1.2.27 are vulnerable to REDHAT-BUG-490201.