Apache Tomcat JK Web Server Connector Double Encoded ".." Security Bypass
Publish date: 21 de julio de 2015
Gravedad: Medio
Fecha recomendada: 21 de julio de 2015
Descripción
mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
Revelación de la información
Apply associated Trend Micro DPI Rules.
Soluciones
Trend Micro Deep Security DPI Rule Number: 1000128
Trend Micro Deep Security DPI Rule Name: 1000128 - HTTP Protocol Decoding
Software y versión afectados
- Apache Software Foundation Tomcat JK Web Server Connector 1.2.22