First published: Tue Jun 11 2024(Updated: )
Karl von Randow discovered that mod_jk was vulnerable to an authentication bypass. If the configuration did not provide explicit mounts for all possible proxied requests, an attacker could possibly use this vulnerability to bypass security constraints configured in httpd.
Affected Software | Affected Version | How to fix |
---|---|---|
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.48-2ubuntu0.1 | 1:1.2.48-2ubuntu0.1 |
Ubuntu | =23.10 | |
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.48-1ubuntu0.1 | 1:1.2.48-1ubuntu0.1 |
Ubuntu | =22.04 | |
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.46-1ubuntu0.1 | 1:1.2.46-1ubuntu0.1 |
Ubuntu | =20.04 | |
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.43-1ubuntu0.1~esm1 | 1:1.2.43-1ubuntu0.1~esm1 |
Ubuntu | =18.04 | |
All of | ||
ubuntu/libapache2-mod-jk | <1:1.2.41-1ubuntu0.1~esm1 | 1:1.2.41-1ubuntu0.1~esm1 |
Ubuntu | =16.04 |
Sign up to SecAlerts for real-time vulnerability data matched to your software, aggregated from hundreds of sources.
USN-6826-1 has been classified as a high severity vulnerability due to its potential for authentication bypass.
To fix USN-6826-1, ensure that you update the libapache2-mod-jk package to at least version 1:1.2.48-2ubuntu0.1.
USN-6826-1 affects various versions of Ubuntu, including 16.04, 18.04, 20.04, 22.04, and 23.10.
Yes, USN-6826-1 can potentially be exploited remotely if the configuration lacks proper mounts for proxied requests.
The nature of the vulnerability in USN-6826-1 is an authentication bypass that compromises the security constraints set in the httpd configuration.