Apache Tomcat JK Web Server Connector Double Encoded ".." Security Bypass
Data de publicação: 21 julho 2015
Schweregrad: : Medium
Data do informe: 21 julho 2015
Descrição
mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
Exposição das informações
Apply associated Trend Micro DPI Rules.
Solução
Trend Micro Deep Security DPI Rule Number: 1000128
Trend Micro Deep Security DPI Rule Name: 1000128 - HTTP Protocol Decoding
Software infectado e versão:
- Apache Software Foundation Tomcat JK Web Server Connector 1.2.22