Apache Tomcat JK Connector Content-Length Header Cross-User Information Disclosure

low Nessus Plugin ID 46885

Synopsis

The remote web server is prone to an information disclosure attack.

Description

Based on the Server response header, the installation of the JK Connector (mod_jk) in Apache Tomcat listening on the remote host is version 1.2.x prior to 1.2.27. It is, therefore, affected by an information disclosure vulnerability. A remote attacker can view the response associated with a different user's request, either by sending a request with a Content-Length without data or by sending repeated requests very quickly.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.

Solution

Upgrade to mod_jk version 1.2.27 or later.

See Also

https://www.securityfocus.com/archive/1/502530

Plugin Details

Severity: Low

ID: 46885

File Name: mod_jk_1_2_27.nasl

Version: 1.10

Type: remote

Family: Web Servers

Published: 6/14/2010

Updated: 4/11/2022

Configuration: Enable thorough checks

Supported Sensors: Nessus

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Low

Base Score: 2.6

Temporal Score: 1.9

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Vulnerability Information

CPE: cpe:/a:apache:tomcat_connectors

Exploit Ease: No known exploits are available

Patch Publication Date: 4/7/2009

Vulnerability Publication Date: 4/7/2009

Reference Information

CVE: CVE-2008-5519

BID: 34412

CWE: 200

SECUNIA: 34621