Apache Tomcat JK Connector Content-Length Header Cross-User Information Disclosure

Low Nessus Plugin ID 46885


The remote web server is prone to an information disclosure attack.


Based on the Server response header, the installation of the JK Connector (mod_jk) in Apache Tomcat listening on the remote host is version 1.2.x prior to 1.2.27. It is, therefore, affected by an information disclosure vulnerability. A remote attacker can view the response associated with a different user's request, either by sending a request with a Content-Length without data or by sending repeated requests very quickly.

Note that Nessus has not tested for this issue but has instead relied only on the application's self-reported version number.


Upgrade to mod_jk version 1.2.27 or later.

See Also


Plugin Details

Severity: Low

ID: 46885

File Name: mod_jk_1_2_27.nasl

Version: $Revision: 1.7 $

Type: remote

Family: Web Servers

Published: 2010/06/14

Modified: 2016/10/19

Dependencies: 10107, 17975

Risk Information

Risk Factor: Low


Base Score: 2.6

Temporal Score: 2.3

Vector: CVSS2#AV:N/AC:H/Au:N/C:P/I:N/A:N

Temporal Vector: CVSS2#E:ND/RL:OF/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat_connectors

Exploit Available: false

Exploit Ease: No known exploits are available

Patch Publication Date: 2009/04/07

Vulnerability Publication Date: 2009/04/07

Reference Information

CVE: CVE-2008-5519

BID: 34412

OSVDB: 53381

Secunia: 34621

CWE: 200