Логотип exploitDog
bind:CVE-2018-11759
Консоль
Логотип exploitDog

exploitDog

bind:CVE-2018-11759

Количество 12

Количество 12

ubuntu логотип

CVE-2018-11759

больше 7 лет назад

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS3: 7.5
EPSS: Критический
redhat логотип

CVE-2018-11759

больше 7 лет назад

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS3: 7.5
EPSS: Критический
nvd логотип

CVE-2018-11759

больше 7 лет назад

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS3: 7.5
EPSS: Критический
debian логотип

CVE-2018-11759

больше 7 лет назад

The Apache Web Server (httpd) specific code that normalised the reques ...

CVSS3: 7.5
EPSS: Критический
suse-cvrf логотип

openSUSE-SU-2018:4032-1

около 7 лет назад

Security update for apache2-mod_jk

EPSS: Критический
suse-cvrf логотип

SUSE-SU-2023:4513-1

около 2 лет назад

Security update for apache2-mod_jk

EPSS: Критический
suse-cvrf логотип

SUSE-SU-2018:3969-1

около 7 лет назад

Security update for apache2-mod_jk

EPSS: Критический
suse-cvrf логотип

SUSE-SU-2018:3963-2

больше 6 лет назад

Security update for apache2-mod_jk

EPSS: Критический
suse-cvrf логотип

SUSE-SU-2018:3963-1

около 7 лет назад

Security update for apache2-mod_jk

EPSS: Критический
github логотип

GHSA-5q2c-33mg-8m75

больше 3 лет назад

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS3: 7.5
EPSS: Критический
fstec логотип

BDU:2019-00886

больше 7 лет назад

Уязвимость коннектора Apache Tomcat JK (mod_jk) Connector веб-сервера Apache для движка сервлетов Tomcat Java, связанная с некорректной обработкой граничных условий, позволяющая нарушителю обойти установленный контроль доступа

CVSS3: 7.5
EPSS: Критический
suse-cvrf логотип

SUSE-SU-2018:3970-1

около 7 лет назад

Security update for apache2-mod_jk

EPSS: Низкий

Уязвимостей на страницу

Уязвимость
CVSS
EPSS
Опубликовано
ubuntu логотип
CVE-2018-11759

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS3: 7.5
94%
Критический
больше 7 лет назад
redhat логотип
CVE-2018-11759

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS3: 7.5
94%
Критический
больше 7 лет назад
nvd логотип
CVE-2018-11759

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS3: 7.5
94%
Критический
больше 7 лет назад
debian логотип
CVE-2018-11759

The Apache Web Server (httpd) specific code that normalised the reques ...

CVSS3: 7.5
94%
Критический
больше 7 лет назад
suse-cvrf логотип
openSUSE-SU-2018:4032-1

Security update for apache2-mod_jk

94%
Критический
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2023:4513-1

Security update for apache2-mod_jk

94%
Критический
около 2 лет назад
suse-cvrf логотип
SUSE-SU-2018:3969-1

Security update for apache2-mod_jk

94%
Критический
около 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3963-2

Security update for apache2-mod_jk

94%
Критический
больше 6 лет назад
suse-cvrf логотип
SUSE-SU-2018:3963-1

Security update for apache2-mod_jk

94%
Критический
около 7 лет назад
github логотип
GHSA-5q2c-33mg-8m75

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS3: 7.5
94%
Критический
больше 3 лет назад
fstec логотип
BDU:2019-00886

Уязвимость коннектора Apache Tomcat JK (mod_jk) Connector веб-сервера Apache для движка сервлетов Tomcat Java, связанная с некорректной обработкой граничных условий, позволяющая нарушителю обойти установленный контроль доступа

CVSS3: 7.5
94%
Критический
больше 7 лет назад
suse-cvrf логотип
SUSE-SU-2018:3970-1

Security update for apache2-mod_jk

около 7 лет назад

Уязвимостей на страницу