Vulnerability Description
The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.
CVSS Score
HIGH
Affected Products
| Vendor | Product | Versions |
|---|---|---|
| Apache | Tomcat Jk Connector | >= 1.2.0, <= 1.2.42 |
Related Weaknesses (CWE)
References
- http://www.securityfocus.com/bid/103389Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1843Third Party Advisory
- https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da
- https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a
- https://lists.apache.org/thread.html/6e146bce83578bd870893250ba8354e28f9d8e86c67
- https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3
- https://lists.apache.org/thread.html/ba661b0edd913b39ff129a32d855620dd861883ade0
- https://lists.apache.org/thread.html/r5c616dfc49156e4b06ffab842800c80f4425924d0f
- https://lists.apache.org/thread.html/rf8e8c091182b45daa50d3557cad9b10bb4198e3f08
- http://www.securityfocus.com/bid/103389Third Party AdvisoryVDB Entry
- https://access.redhat.com/errata/RHSA-2018:1843Third Party Advisory
- https://lists.apache.org/thread.html/277d42b48b6e9aef50949c0dcc79ce21693091d73da
- https://lists.apache.org/thread.html/5b7a23e245c93235c503900da854a143596d901bf1a
- https://lists.apache.org/thread.html/6e146bce83578bd870893250ba8354e28f9d8e86c67
- https://lists.apache.org/thread.html/8d2a579bbd977c225c70cb23b0ec54865fb0dab5da3
FAQ
What is CVE-2018-1323?
CVE-2018-1323 is a vulnerability with a CVSS score of 7.5 (HIGH). The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly...
How severe is CVE-2018-1323?
CVE-2018-1323 has been rated HIGH with a CVSS base score of 7.5/10. Review the CVSS metrics above for detailed severity breakdown.
Is there a patch for CVE-2018-1323?
Check the references section above for vendor advisories and patch information. Affected products include: Apache Tomcat Jk Connector.