Apache Tomcat JK Web Server Connector Double Encoded ".." Security Bypass
Publish Date: 21 de lipca de 2015
Severity: : Medium
Advisory Date: 21 de lipca de 2015
DESCRIPTION
mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
INFORMATION EXPOSURE
Apply associated Trend Micro DPI Rules.
SOLUTION
Trend Micro Deep Security DPI Rule Number: 1000128
Trend Micro Deep Security DPI Rule Name: 1000128 - HTTP Protocol Decoding
AFFECTED SOFTWARE AND VERSION:
- Apache Software Foundation Tomcat JK Web Server Connector 1.2.22