CVE-2008-5519

The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
2.6 UNKNOWN
NETWORK
HIGH
AV:N/AC:H/Au:N/C:P/I:N/A:N
redhatCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 90%
VendorProductVersion
apachemod_jk
1.2
apachemod_jk
1.2.1
apachemod_jk
1.2.6
apachemod_jk
1.2.7
apachemod_jk
1.2.8
apachemod_jk
1.2.9
apachemod_jk
1.2.10
apachemod_jk
1.2.11
apachemod_jk
1.2.12
apachemod_jk
1.2.13
apachemod_jk
1.2.14
apachemod_jk
1.2.14.1
apachemod_jk
1.2.15
apachemod_jk
1.2.16
apachemod_jk
1.2.17
apachemod_jk
1.2.18
apachemod_jk
1.2.19
apachemod_jk
1.2.20
apachemod_jk
1.2.21
apachemod_jk
1.2.22
apachemod_jk
1.2.23
apachemod_jk
1.2.24
apachemod_jk
1.2.25
apachemod_jk
1.2.26
apachetomcat
4.0.0
apachetomcat
4.0.1
apachetomcat
4.0.2
apachetomcat
4.0.3
apachetomcat
4.0.4
apachetomcat
4.0.5
apachetomcat
4.0.6
apachetomcat
4.1.0
apachetomcat
4.1.1
apachetomcat
4.1.2
apachetomcat
4.1.3
apachetomcat
4.1.3:beta
apachetomcat
4.1.4
apachetomcat
4.1.5
apachetomcat
4.1.6
apachetomcat
4.1.7
apachetomcat
4.1.8
apachetomcat
4.1.9
apachetomcat
4.1.9:beta
apachetomcat
4.1.10
apachetomcat
4.1.11
apachetomcat
4.1.12
apachetomcat
4.1.13
apachetomcat
4.1.14
apachetomcat
4.1.15
apachetomcat
4.1.16
apachetomcat
4.1.17
apachetomcat
4.1.18
apachetomcat
4.1.19
apachetomcat
4.1.20
apachetomcat
4.1.21
apachetomcat
4.1.22
apachetomcat
4.1.23
apachetomcat
4.1.24
apachetomcat
4.1.25
apachetomcat
4.1.26
apachetomcat
4.1.27
apachetomcat
4.1.28
apachetomcat
4.1.29
apachetomcat
4.1.30
apachetomcat
4.1.31
apachetomcat
4.1.32
apachetomcat
4.1.33
apachetomcat
4.1.34
apachetomcat
4.1.35
apachetomcat
4.1.36
apachetomcat
5.0.0
apachetomcat
5.0.1
apachetomcat
5.0.2
apachetomcat
5.0.3
apachetomcat
5.0.4
apachetomcat
5.0.5
apachetomcat
5.0.6
apachetomcat
5.0.7
apachetomcat
5.0.8
apachetomcat
5.0.9
apachetomcat
5.0.10
apachetomcat
5.0.11
apachetomcat
5.0.12
apachetomcat
5.0.13
apachetomcat
5.0.14
apachetomcat
5.0.15
apachetomcat
5.0.16
apachetomcat
5.0.17
apachetomcat
5.0.18
apachetomcat
5.0.19
apachetomcat
5.0.21
apachetomcat
5.0.22
apachetomcat
5.0.23
apachetomcat
5.0.24
apachetomcat
5.0.25
apachetomcat
5.0.26
apachetomcat
5.0.27
apachetomcat
5.0.28
apachetomcat
5.0.29
apachetomcat
5.0.30
apachetomcat
5.5.0
apachetomcat
5.5.1
apachetomcat
5.5.2
apachetomcat
5.5.3
apachetomcat
5.5.4
apachetomcat
5.5.5
apachetomcat
5.5.6
apachetomcat
5.5.7
apachetomcat
5.5.8
apachetomcat
5.5.9
apachetomcat
5.5.10
apachetomcat
5.5.11
apachetomcat
5.5.12
apachetomcat
5.5.13
apachetomcat
5.5.14
apachetomcat
5.5.15
apachetomcat
5.5.16
apachetomcat
5.5.17
apachetomcat
5.5.18
apachetomcat
5.5.19
apachetomcat
5.5.20
apachetomcat
5.5.21
apachetomcat
5.5.22
apachetomcat
5.5.23
apachetomcat
5.5.24
apachetomcat
5.5.25
apachetomcat
5.5.26
apachetomcat
5.5.27
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libapache-mod-jk
bullseye
1:1.2.48-1+deb11u1
fixed
bullseye (security)
1:1.2.48-1+deb11u2
fixed
bookworm
1:1.2.48-2+deb12u1
fixed
sid
1:1.2.49-1
fixed
trixie
1:1.2.49-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
libapache-mod-jk
oneiric
not-affected
natty
not-affected
maverick
not-affected
lucid
not-affected
karmic
not-affected
jaunty
Fixed 1:1.2.26-2+lenny1build0.9.04.1
released
intrepid
Fixed 1:1.2.26-2+lenny1build0.8.10.1
released
hardy
ignored
dapper
ignored
References