Apache Tomcat JK connector security bypass

Description

mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.

Remediation

Upgrade to the latest version of Apache Tomcat JK Web Server Connector (the problem was fixed in version 1.2.23).

References
Severity
Classification
Tags
  • Abuse Of Functionality  Directory Traversal