Severity
7.5HIGH
EPSS
53.9%
top 2.00%
CISA KEV
Not in KEV
Exploit
No known exploits
Timeline
PublishedMar 12
Latest updateMay 14

Description

The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.

CVSS vector

CVSS:3.0/AV:N/AC:L/PR:N/UI:N/S:U/C:H/I:N/A:NExploitability: 3.9 | Impact: 3.6

Affected Packages2 packages

NVDapache/tomcat_jk_connector1.2.01.2.42
CVEListV5apache_software_foundation/apache_tomcat_connectorsApache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42

🔴Vulnerability Details

2
GHSA
GHSA-jxj8-3w7h-p8mx: The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 12022-05-14
CVEList
CVE-2018-1323: The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 12018-03-12

💥Exploits & PoCs

2
Exploit-DB
Skia and Firefox - Integer Overflow in SkTDArray Leading to Out-of-Bounds Write2018-05-25
Nuclei
Apache Tomcat JK Connect <=1.2.44 - Manager Access

📋Vendor Advisories

3
Red Hat
mod_jk: connector path traversal due to mishandled HTTP requests in httpd2018-10-31
Red Hat
isapi_redirect: Mishandled HTTP request paths in jk_isapi_plugin.c can lead to unintended exposure of application resources via the reverse proxy2018-03-13
Debian
CVE-2018-1323: libapache-mod-jk - The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2...2018

💬Community

1
Bugzilla
CVE-2018-1323 isapi_redirect: Mishandled HTTP request paths in jk_isapi_plugin.c can lead to unintended exposure of application resources via the reverse proxy2018-03-13
CVE-2018-1323 (HIGH CVSS 7.5) | The IIS/ISAPI specific code in the | cvebase.io