CVE-2018-1323
Severity
7.5HIGH
EPSS
53.9%
top 2.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 12
Latest updateMay 14
Description
The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.
CVSS vector
CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6
Affected Packages2 packages
▶CVEListV5apache_software_foundation/apache_tomcat_connectorsApache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42
🔴Vulnerability Details
2💥Exploits & PoCs
2Exploit-DB
▶
Nuclei▶
Apache Tomcat JK Connect <=1.2.44 - Manager Access
📋Vendor Advisories
3💬Community
1Bugzilla▶
CVE-2018-1323 isapi_redirect: Mishandled HTTP request paths in jk_isapi_plugin.c can lead to unintended exposure of application resources via the reverse proxy↗2018-03-13