FreeBSD Bugzilla – Attachment 78621 Details for
Bug 113066
[patch] Security update for www/mod_jk to 1.2.23
Home
|
New
|
Browse
|
Search
|
[?]
|
Reports
|
Help
|
New Account
|
Log In
Remember
[x]
|
Forgot Password
Login:
[x]
[patch]
file.diff
file.diff (text/plain), 1.77 KB, created by
Nick Barkas
on 2007-05-27 21:00:30 UTC
(
hide
)
Description:
file.diff
Filename:
MIME Type:
Creator:
Nick Barkas
Created:
2007-05-27 21:00:30 UTC
Size:
1.77 KB
patch
obsolete
>--- vuln.xml.orig Thu May 24 17:37:57 2007 >+++ vuln.xml Sun May 27 11:52:03 2007 >@@ -34,6 +34,41 @@ > > --> > <vuxml xmlns="http://www.vuxml.org/apps/vuxml-1"> >+ <vuln vid="8d43de9b-0b0b-11dc-a097-0030485949d4"> >+ <topic>mod_jk -- Double encoded ".." security bypass</topic> >+ <affects> >+ <package> >+ <name>mod_jk-ap2</name> >+ <name>mod_jk</name> >+ <range><ge>1.2.20</ge><lt>1.2.23</lt></range> >+ <range><ge>1.2.20,1</ge><lt>1.2.23,1</lt></range> >+ </package> >+ </affects> >+ <description> >+ <body xmlns="http://www.w3.org/1999/xhtml"> >+ <blockquote cite="http://tomcat.apache.org/security-jk.html"> >+ <p>The Tomcat developers report:</p> >+ <p>mod_jk before version 1.2.23 by default decoded request URLs inside >+ Apache httpd and forwarded the encoded URL to Tomcat, which itself did a >+ second decoding. This made it possible to pass a prefix JkMount for >+ /someapp, but actually access /otherapp on Tomcat. Starting with version >+ 1.2.23 by default mod_jk forwards the original unchanged request URL to >+ Tomcat. You can achieve the same level of security for older versions by >+ setting the forwarding option "JkOption ForwardURICompatUnparsed".</p> >+ </blockquote> >+ </body> >+ </description> >+ <references> >+ <cvename>CVE-2007-1860</cvename> >+ <url>http://tomcat.apache.org/connectors-doc/news/20070301.html#20070518.1</url> >+ <url>http://tomcat.apache.org/security-jk.html</url> >+ <url>http://secunia.com/advisories/25383</url> >+ </references> >+ <dates> >+ <discovery>2007-05-18</discovery> >+ <entry>2007-05-26</entry> >+ </dates> >+ </vuln> > <vuln vid="de2fab2d-0a37-11dc-aae2-00304881ac9a"> > <topic>FreeType 2 -- Heap overflow vulnerability</topic> > <affects> >--- vuln.xml.patch ends here ---
You cannot view the attachment while viewing its details because your browser does not support IFRAMEs.
View the attachment on a separate page
.
View Attachment As Diff
View Attachment As Raw
Actions:
View
|
Diff
Attachments on
bug 113066
:
78620
| 78621