CVE-2008-5519

EUVD-2008-5494
The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTPrimary
2.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:N/A:N
Base Score
CVSS 3.x
EPSS Score
Percentile: 88%
Affected Products (NVD)
VendorProductVersion
apachemod_jk
1.2
apachemod_jk
1.2.1
apachemod_jk
1.2.6
apachemod_jk
1.2.7
apachemod_jk
1.2.8
apachemod_jk
1.2.9
apachemod_jk
1.2.10
apachemod_jk
1.2.11
apachemod_jk
1.2.12
apachemod_jk
1.2.13
apachemod_jk
1.2.14
apachemod_jk
1.2.14.1
apachemod_jk
1.2.15
apachemod_jk
1.2.16
apachemod_jk
1.2.17
apachemod_jk
1.2.18
apachemod_jk
1.2.19
apachemod_jk
1.2.20
apachemod_jk
1.2.21
apachemod_jk
1.2.22
apachemod_jk
1.2.23
apachemod_jk
1.2.24
apachemod_jk
1.2.25
apachemod_jk
1.2.26
apachetomcat
4.0.0
apachetomcat
4.0.1
apachetomcat
4.0.2
apachetomcat
4.0.3
apachetomcat
4.0.4
apachetomcat
4.0.5
apachetomcat
4.0.6
apachetomcat
4.1.0
apachetomcat
4.1.1
apachetomcat
4.1.2
apachetomcat
4.1.3
apachetomcat
4.1.3:beta
apachetomcat
4.1.4
apachetomcat
4.1.5
apachetomcat
4.1.6
apachetomcat
4.1.7
apachetomcat
4.1.8
apachetomcat
4.1.9
apachetomcat
4.1.9:beta
apachetomcat
4.1.10
apachetomcat
4.1.11
apachetomcat
4.1.12
apachetomcat
4.1.13
apachetomcat
4.1.14
apachetomcat
4.1.15
apachetomcat
4.1.16
apachetomcat
4.1.17
apachetomcat
4.1.18
apachetomcat
4.1.19
apachetomcat
4.1.20
apachetomcat
4.1.21
apachetomcat
4.1.22
apachetomcat
4.1.23
apachetomcat
4.1.24
apachetomcat
4.1.25
apachetomcat
4.1.26
apachetomcat
4.1.27
apachetomcat
4.1.28
apachetomcat
4.1.29
apachetomcat
4.1.30
apachetomcat
4.1.31
apachetomcat
4.1.32
apachetomcat
4.1.33
apachetomcat
4.1.34
apachetomcat
4.1.35
apachetomcat
4.1.36
apachetomcat
5.0.0
apachetomcat
5.0.1
apachetomcat
5.0.2
apachetomcat
5.0.3
apachetomcat
5.0.4
apachetomcat
5.0.5
apachetomcat
5.0.6
apachetomcat
5.0.7
apachetomcat
5.0.8
apachetomcat
5.0.9
apachetomcat
5.0.10
apachetomcat
5.0.11
apachetomcat
5.0.12
apachetomcat
5.0.13
apachetomcat
5.0.14
apachetomcat
5.0.15
apachetomcat
5.0.16
apachetomcat
5.0.17
apachetomcat
5.0.18
apachetomcat
5.0.19
apachetomcat
5.0.21
apachetomcat
5.0.22
apachetomcat
5.0.23
apachetomcat
5.0.24
apachetomcat
5.0.25
apachetomcat
5.0.26
apachetomcat
5.0.27
apachetomcat
5.0.28
apachetomcat
5.0.29
apachetomcat
5.0.30
apachetomcat
5.5.0
apachetomcat
5.5.1
apachetomcat
5.5.2
apachetomcat
5.5.3
apachetomcat
5.5.4
apachetomcat
5.5.5
apachetomcat
5.5.6
apachetomcat
5.5.7
apachetomcat
5.5.8
apachetomcat
5.5.9
apachetomcat
5.5.10
apachetomcat
5.5.11
apachetomcat
5.5.12
apachetomcat
5.5.13
apachetomcat
5.5.14
apachetomcat
5.5.15
apachetomcat
5.5.16
apachetomcat
5.5.17
apachetomcat
5.5.18
apachetomcat
5.5.19
apachetomcat
5.5.20
apachetomcat
5.5.21
apachetomcat
5.5.22
apachetomcat
5.5.23
apachetomcat
5.5.24
apachetomcat
5.5.25
apachetomcat
5.5.26
apachetomcat
5.5.27
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libapache-mod-jk
bookworm
1:1.2.48-2+deb12u1
fixed
bullseye
1:1.2.48-1+deb11u1
fixed
bullseye (security)
1:1.2.48-1+deb11u2
fixed
sid
1:1.2.49-1
fixed
trixie
1:1.2.49-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libapache-mod-jk
dapper
ignored
hardy
ignored
intrepid
Fixed 1:1.2.26-2+lenny1build0.8.10.1
released
jaunty
Fixed 1:1.2.26-2+lenny1build0.9.04.1
released
karmic
not-affected
lucid
not-affected
maverick
not-affected
natty
not-affected
oneiric
not-affected
References