Apache Tomcat JK Web Server Connector Double Encoded ".." Security Bypass

  Severity: MEDIUM
  Advisory Date: JUL 21, 2015

  DESCRIPTION

mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.

  TREND MICRO PROTECTION INFORMATION

Apply associated Trend Micro DPI Rules.

  SOLUTION

  Trend Micro Deep Security DPI Rule Number: 1000128
  Trend Micro Deep Security DPI Rule Name: 1000128 - HTTP Protocol Decoding

  AFFECTED SOFTWARE AND VERSION

  • Apache Software Foundation Tomcat JK Web Server Connector 1.2.22