Apache Tomcat JK connector security bypass

Description
  • mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.
Remediation
  • Upgrade to the latest version of Apache Tomcat JK Web Server Connector (the problem was fixed in version 1.2.23).
References