CVE-2018-1323 Apache Tomcat JK ISAPI Connector path traversal
Vendor: The Apache Software Foundation
- Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42
The IIS/ISAPI specific code that normalised the requested path before
matching it to the URI-worker map did not handle some edge cases
correctly. If only a sub-set of the URLs supported by Tomcat were
exposed via IIS, then it was possible for a specially constructed
request to expose application functionality through the reverse proxy
that was not intended for clients accessing the application via the
Users of affected versions should apply one of the following mitigations:
- Upgrade to Apache Tomcat JK ISAPI Connector 1.2.43 or later.
- Use alternative measures (e.g. the remote address filter) to restrict
access to trusted users.
This issue was discovered by Alphan Yavas from Biznet Bilisim A.S. and
reported responsibly to the Apache Tomcat Security Team.