Learn about CVE-2018-11759 affecting Apache Tomcat Connectors. Discover the impact, affected versions, and mitigation steps for this information disclosure vulnerability.
CVE-2018-11759, published on October 31, 2018, affects Apache Tomcat Connectors, specifically the Apache Tomcat JK (mod_jk) Connector versions 1.2.0 to 1.2.44. The vulnerability lies in the Apache Web Server (httpd) code that normalizes requested paths before matching them to the URI-worker map in the connector.
Understanding CVE-2018-11759
This CVE entry addresses an information disclosure vulnerability in Apache Tomcat Connectors.
What is CVE-2018-11759?
The issue arises from the mishandling of certain edge cases in the normalization process of requested paths by the Apache Web Server when interacting with the Apache Tomcat JK Connector. This mishandling could lead to unintended exposure of application functionality through a reverse proxy.
The Impact of CVE-2018-11759
The vulnerability could allow a specially crafted request to reveal application functionality not meant for clients accessing the application via the reverse proxy. Additionally, in specific configurations, it could bypass access controls set up in the Apache Web Server.
Technical Details of CVE-2018-11759
This section delves into the technical aspects of the CVE.
Vulnerability Description
The Apache Web Server's normalization of requested paths could lead to unintended exposure of application functionality through the reverse proxy.
Affected Systems and Versions
Exploitation Mechanism
A specially crafted request exploiting the normalization process of requested paths could reveal sensitive application functionality.
Mitigation and Prevention
Protecting systems from CVE-2018-11759 involves immediate steps and long-term security practices.
Immediate Steps to Take
Long-Term Security Practices
Patching and Updates
Ensure that the Apache Tomcat JK Connector is updated to a version that addresses the vulnerability.