First published: Tue Jun 11 2024(Updated: )
Karl von Randow discovered that mod_jk was vulnerable to an authentication bypass. If the configuration did not provide explicit mounts for all possible proxied requests, an attacker could possibly use this vulnerability to bypass security constraints configured in httpd.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.48-2ubuntu0.1 | 1:1.2.48-2ubuntu0.1 |
Ubuntu Linux | =23.10 | |
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.48-1ubuntu0.1 | 1:1.2.48-1ubuntu0.1 |
Ubuntu Linux | =22.04 | |
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.46-1ubuntu0.1 | 1:1.2.46-1ubuntu0.1 |
Ubuntu Linux | =20.04 | |
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.43-1ubuntu0.1~esm1 | 1:1.2.43-1ubuntu0.1~esm1 |
Ubuntu Linux | =18.04 | |
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.41-1ubuntu0.1~esm1 | 1:1.2.41-1ubuntu0.1~esm1 |
Ubuntu Linux | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.