Логотип exploitDog
Консоль
Логотип exploitDog

exploitDog

redhat логотип

CVE-2014-8111

Опубликовано: 14 апр. 2015
Источник: redhat
CVSS2: 5
EPSS Низкий

Описание

Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.

It was discovered that a JkUnmount rule for a subtree of a previous JkMount rule could be ignored. This could allow a remote attacker to potentially access a private artifact in a tree that would otherwise not be accessible to them.

Отчет

Red Hat Product Security has rated this issue as having Moderate security impact. This issue is not currently planned to be addressed in future updates of Red Hat Enterprise Application Platform 4 and 5, and Red Hat JBoss Web Server 1. For additional information, refer to the Issue Severity Classification: https://access.redhat.com/security/updates/classification/ and Red Hat JBoss Middleware and Red Hat JBoss Operations Network Product Update and Support Policy: https://access.redhat.com/support/policy/updates/jboss_notes/. This issue did not affect Red Hat JBoss Web Server 3.x. This issue does affect Red Hat JBoss Web Server 2.x; a future update may address this issue.

Затронутые пакеты

ПлатформаПакетСостояниеРекомендацияРелиз
Red Hat JBoss Enterprise Application Platform 4mod_jkWill not fix
Red Hat JBoss Enterprise Application Platform 5mod_jkWill not fix
Red Hat JBoss Enterprise Web Server 1mod_jkWill not fix
Red Hat JBoss Enterprise Application Platform 6.4FixedRHSA-2015:084916.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-cli-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-codec-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-configuration-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-daemon-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-io-eap6FixedRHSA-2015:084616.04.2015
Red Hat JBoss Enterprise Application Platform 6.4 for RHEL 5apache-commons-lang-eap6FixedRHSA-2015:084616.04.2015

Показывать по

Дополнительная информация

Статус:

Moderate
https://bugzilla.redhat.com/show_bug.cgi?id=1182591mod_jk: information leak due to incorrect JkMount/JkUnmount directives processing

EPSS

Процентиль: 88%
0.03739
Низкий

5 Medium

CVSS2

Связанные уязвимости

ubuntu
почти 11 лет назад

Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.

nvd
почти 11 лет назад

Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.

debian
почти 11 лет назад

Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rule ...

github
больше 3 лет назад

Apache Tomcat Connectors (mod_jk) before 1.2.41 ignores JkUnmount rules for subtrees of previous JkMount rules, which allows remote attackers to access otherwise restricted artifacts via unspecified vectors.

suse-cvrf
около 7 лет назад

Security update for apache2-mod_jk

EPSS

Процентиль: 88%
0.03739
Низкий

5 Medium

CVSS2

Уязвимость CVE-2014-8111