Information Exposure Affecting tomcat_jk_connector package, versions [1.2.0,1.2.43)


Severity

Recommended
0.0
high
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
56.73% (98th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TOMCATJKCONNECTOR-2382181
  • published26 Jan 2022
  • disclosed12 Mar 2018
  • creditUnknown

Introduced: 12 Mar 2018

CVE-2018-1323  (opens in a new tab)
CWE-200  (opens in a new tab)
CWE-22  (opens in a new tab)

How to fix?

Upgrade tomcat_jk_connector to version 1.2.43 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure. The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.

CVSS Base Scores

version 3.1