[Forgot Password]
Login  Register Subscribe

30479

 
 

423868

 
 

248268

 
 

909

 
 

195051

 
 

282

Paid content will be excluded from the download.


Download | Alert*
OVAL

Apache HTTP server - (bulletinjan2019)

ID: oval:org.secpod.oval:def:2103537Date: (C)2019-12-31   (M)2024-01-29
Class: PATCHFamily: unix




The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

Platform:
Sun Solaris 11
Product:
web/server/apache-24/module/apache-jk
Reference:
bulletinjan2019
CVE-2018-11759
CVE-2018-1323
CVE    2
CVE-2018-11759
CVE-2018-1323
CPE    1
cpe:/o:oracle:solaris:11

© SecPod Technologies