// For flags

CVE-2023-41081

Apache Tomcat Connectors: Unexpected use of first declared worker in mod_jk for unmapped request

Severity Score

7.5
*CVSS v3.1

Exploit Likelihood

*EPSS

Affected Versions

*CPE

Public Exploits

0
*Multiple Sources

Exploited in Wild

-
*KEV

Decision

Attend
*SSVC
Descriptions

Important: Authentication Bypass CVE-2023-41081

The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected.

This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48.

Users are recommended to upgrade to version 1.2.49, which fixes the issue.

History
2023-09-13 Original advisory

2023-09-28 Updated summary

Importante: Omisión de Autenticación CVE-2023-41081. El componente mod_jk de Apache Tomcat Connectors en algunas circunstancias, como cuando una configuración incluía "JkOptions +ForwardDirectories" pero la configuración no proporcionaba mounts explícitos para todas las posibles solicitudes de proxy, mod_jk usaría un mapeo implícito y mapearía la solicitud al primer worker definido. Un mapeo implícito de este tipo podría dar como resultado la exposición no deseada del estado del worker y/o eludir las restricciones de seguridad configuradas en httpd. A partir de JK 1.2.49, la funcionalidad de asignación implícita se eliminó y todas las asignaciones ahora deben realizarse mediante una configuración explícita. Sólo mod_jk se ve afectado por este problema. El redirector ISAPI no se ve afectado. Este problema afecta a los conectores Apache Tomcat (solo mod_jk): desde la versión 1.2.0 hasta la 1.2.48. Se recomienda a los usuarios actualizar a la versión 1.2.49, que soluciona el problema. Historia: 2023-09-13. Aviso original: 2023-09-28. Resumen actualizado

A vulnerability was found in Apache Tomcat Connectors (mod_jk). Affected versions of this package are vulnerable to information exposure in the mod_jk component. This flaw allows an attacker to exploit the implicit mapping functionality, resulting in the unintended exposure of the status worker and bypassing security constraints configured in httpd.

*Credits: Karl von Randow
CVSS Scores
Attack Vector
Network
Attack Complexity
Low
Privileges Required
None
User Interaction
None
Scope
Unchanged
Confidentiality
High
Integrity
None
Availability
None
* Common Vulnerability Scoring System
SSVC
  • Decision:Attend
Exploitation
None
Automatable
Yes
Tech. Impact
Partial
* Organization's Worst-case Scenario
Timeline
  • 2023-08-22 CVE Reserved
  • 2023-09-13 CVE Published
  • 2024-09-25 CVE Updated
  • 2024-10-27 EPSS Updated
  • ---------- Exploited in Wild
  • ---------- KEV Due Date
  • ---------- First Exploit
CWE
  • CWE-202: Exposure of Sensitive Information Through Data Queries
CAPEC
Affected Vendors, Products, and Versions
Vendor Product Version Other Status
Vendor Product Version Other Status <-- --> Vendor Product Version Other Status
Apache
Search vendor "Apache"
Tomcat Connectors
Search vendor "Apache" for product "Tomcat Connectors"
>= 1.2.0 < 1.2.49
Search vendor "Apache" for product "Tomcat Connectors" and version " >= 1.2.0 < 1.2.49"
-
Affected