Apache Tomcat JK Web Server Connector Double Encoded ".." Security Bypass
Publish Date: 21 juillet 2015
Gravité: : Medium
Date du conseil: 21 juillet 2015
Description
mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
Information Exposure Rating:
Apply associated Trend Micro DPI Rules.
Solutions
Trend Micro Deep Security DPI Rule Number: 1000128
Trend Micro Deep Security DPI Rule Name: 1000128 - HTTP Protocol Decoding
Affected software and version:
- Apache Software Foundation Tomcat JK Web Server Connector 1.2.22