Apache TomCat mod_jk < 1.2.27 Cross-user Information Disclosure

medium Nessus Network Monitor Plugin ID 4984

Synopsis

The remote host is vulnerable to a flaw that allows attackers to retrieve sensitive files or data.

Description

The remote host is running the Apache Tomcat web server with mod_jk

. mod_jk is reported vulnerable to an information disclosure flaw due to the way that it processes 'Content-Length' headers. Allegedly, an attacker supplying a NULL content-length can view the HTTP responses of other requests. An attacker exploiting this flaw would be able to possibly gain access to confidential data.

Solution

Upgrade to version 1.2.27 or higher.

See Also

http://tomcat.apache.org/download-connectors.cgi

Plugin Details

Severity: Medium

ID: 4984

Family: Web Servers

Published: 4/8/2009

Updated: 3/6/2019

Nessus ID: 46885

Risk Information

VPR

Risk Factor: Medium

Score: 4.2

CVSS v2

Risk Factor: Medium

Base Score: 5

Temporal Score: 4.1

Vector: CVSS2#AV:N/AC:L/Au:N/C:P/I:N/A:N

CVSS v3

Risk Factor: Medium

Base Score: 5.3

Temporal Score: 4.9

Vector: CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:L/I:N/A:N

Temporal Vector: CVSS:3.0/E:F/RL:O/RC:C

Vulnerability Information

CPE: cpe:/a:apache:tomcat

Reference Information

CVE: CVE-2008-5519

BID: 34412