The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.
References
Configurations
History
21 Nov 2024, 03:43
Type | Values Removed | Values Added |
---|---|---|
References | () http://www.securityfocus.com/bid/105888 - Third Party Advisory, VDB Entry | |
References | () https://access.redhat.com/errata/RHSA-2019:0366 - Third Party Advisory | |
References | () https://access.redhat.com/errata/RHSA-2019:0367 - Third Party Advisory | |
References | () https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da246b3c1981925%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a1f67e851a5de4%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/6d564bb0ab73d6b3efdd1d6b1c075d1a2c84ecd84a4159d6122529ad%40%3Cannounce.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3eff1e060c9935%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade05fd88a8ce517d%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f20c452c127a53c%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08cf8f1c66a1b08d%40%3Cdev.tomcat.apache.org%3E - | |
References | () https://lists.debian.org/debian-lts-announce/2018/12/msg00007.html - Mailing List, Third Party Advisory | |
References | () https://www.debian.org/security/2018/dsa-4357 - Third Party Advisory | |
References | () https://www.oracle.com/security-alerts/cpujan2020.html - |
07 Nov 2023, 02:51
Type | Values Removed | Values Added |
---|---|---|
References |
|
|
Information
Published : 2018-10-31 20:29
Updated : 2024-11-21 03:43
NVD link : CVE-2018-11759
Mitre link : CVE-2018-11759
CVE.ORG link : CVE-2018-11759
JSON object : View
Products Affected
debian
- debian_linux
redhat
- jboss_core_services
apache
- tomcat_jk_connector
CWE
CWE-22
Improper Limitation of a Pathname to a Restricted Directory ('Path Traversal')