Rapid7 Vulnerability & Exploit Database

FreeBSD: mod_jk -- information disclosure (CVE-2007-1860)

Back to Search

FreeBSD: mod_jk -- information disclosure (CVE-2007-1860)

Severity
5
CVSS
(AV:N/AC:L/Au:N/C:P/I:N/A:N)
Published
05/25/2007
Created
07/25/2018
Added
05/08/2014
Modified
05/27/2016

Description

mod_jk in Apache Tomcat JK Web Server Connector 1.2.x before 1.2.23 decodes request URLs within the Apache HTTP Server before passing the URL to Tomcat, which allows remote attackers to access protected pages via a crafted prefix JkMount, possibly involving double-encoded .. (dot dot) sequences and directory traversal, a related issue to CVE-2007-0450.

Solution(s)

  • freebsd-upgrade-package-mod_jk
  • freebsd-upgrade-package-mod_jk-ap2

References

  • freebsd-upgrade-package-mod_jk
  • freebsd-upgrade-package-mod_jk-ap2

With Rapid7 live dashboards, I have a clear view of all the assets on my network, which ones can be exploited, and what I need to do in order to reduce the risk in my environment in real-time. No other tool gives us that kind of value and insight.

– Scott Cheney, Manager of Information Security, Sierra View Medical Center

;