www-announce mailing list archives

Site index · List index
Message view « Date » · « Thread »
Top « Date » · « Thread »
From Mark Thomas <ma...@apache.org>
Subject [SECURITY] CVE-2018-1323 Apache Tomcat JK ISAPI Connector path traversal
Date Mon, 12 Mar 2018 12:22:39 GMT
CVE-2018-1323 Apache Tomcat JK ISAPI Connector path traversal

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
- Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42

The IIS/ISAPI specific code that normalised the requested path before
matching it to the URI-worker map did not handle some edge cases
correctly. If only a sub-set of the URLs supported by Tomcat were
exposed via IIS, then it was possible for a specially constructed
request to expose application functionality through the reverse proxy
that was not intended for clients accessing the application via the
reverse proxy.

Users of affected versions should apply one of the following mitigations:
- Upgrade to Apache Tomcat JK ISAPI Connector 1.2.43 or later.
- Use alternative measures (e.g. the remote address filter) to restrict
  access to trusted users.

This issue was discovered by Alphan Yavas from Biznet Bilisim A.S. and
reported responsibly to the Apache Tomcat Security Team.

[1] http://tomcat.apache.org/security-jk.html

View raw message