CVE-2018-1323

The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.
Path Traversal
ProviderTypeBase ScoreAtk. VectorAtk. ComplexityPriv. RequiredVector
NISTNIST
7.5 HIGH
NETWORK
LOW
NONE
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:N
apacheCNA
---
---
CVEADP
---
---
Base Score
CVSS 3.x
EPSS Score
Percentile: 97%
VendorProductVersion
apachetomcat_jk_connector
1.2.0 ≤
𝑥
≤ 1.2.42
𝑥
= Vulnerable software versions
Debian logo
Debian Releases
Debian Product
Codename
libapache-mod-jk
bullseye
1:1.2.48-1+deb11u1
fixed
bullseye (security)
1:1.2.48-1+deb11u2
fixed
bookworm
1:1.2.48-2+deb12u1
fixed
sid
1:1.2.49-1
fixed
trixie
1:1.2.49-1
fixed
Ubuntu logo
Ubuntu Releases
Ubuntu Product
Codename
tomcat8
artful
not-affected
xenial
not-affected
trusty
dne
References