Korean
<< Back
VID 22541
Severity 40
Port 80, ...
Protocol TCP
Class WWW
Detailed Description According to its self-reported version number, the instance of Apache Tomcat 6.x listening on the remote host is earlier than 6.0.35 and therefore potentially allows an attacker to have control over AJP messages.

Specially crafted requests are incorrectly processed by Tomcat and can cause the server to allow injection of arbitrary AJP messages. This can lead to authentication bypass and disclosure of sensitive information.

Note this vulnerability only occurs when the following are true :

- the org.apache.jk.server.JkCoyoteHandler AJP connector
is not used.

- POST requests are accepted.

- the request body is not processed.

* Note: This check solely relied on the version number of the remote Web server to assess this vulnerability, so this might be a false positive.

* References:
https://issues.apache.org/bugzilla/show_bug.cgi?id=51698#c2
http://svn.apache.org/viewvc?view=revision&revision=1162959
http://tomcat.apache.org/security-6.html#Fixed_in_Apache_Tomcat_6.0.35

* Platforms Affected:
Apache Tomcat Server versions prior to 6.0.35
Any operating system Any version
Recommendation Upgrade to the latest version of Apache Tomcat Server (6.0.35 or later), available from the Apache Software Foundation download site, http://tomcat.apache.org/
Related URL CVE-2011-3190 (CVE)
Related URL 49353 (SecurityFocus)
Related URL (ISS)