Information Exposure Affecting tomcat_jk_connector package, versions [1.2.0, 1.2.49)


Severity

Recommended
0.0
medium
0
10

CVSS assessment by Snyk's Security Team. Learn more

Threat Intelligence

EPSS
0.03% (6th percentile)

Do your applications use this vulnerable package?

In a few clicks we can analyze your entire application and see what components are vulnerable in your application, and suggest you quick fixes.

Test your applications
  • Snyk IDSNYK-UNMANAGED-TOMCATJKCONNECTOR-9673822
  • published14 Sept 2023
  • disclosed13 Sept 2023
  • creditKarl von Randow

Introduced: 13 Sep 2023

CVE-2023-41081  (opens in a new tab)
CWE-200  (opens in a new tab)

How to fix?

Upgrade tomcat_jk_connector to version 1.2.49 or higher.

Overview

Affected versions of this package are vulnerable to Information Exposure in the mod_jk component, allowing an attacker to exploit the implicit mapping functionality, resulting in the unintended exposure of the status worker and/or bypassing security constraints configured in httpd.

Note: Only mod_jk is affected by this issue. The ISAPI redirector is not affected.

CVSS Base Scores

version 3.1