NOTICE: This version of the NSF Unidata web site (archive.unidata.ucar.edu) is no longer being updated.
Current content can be found at unidata.ucar.edu.

To learn about what's going on, see About the Archive Site.

[thredds] Fwd: [SECURITY] CVE-2023-41081 Apache Tomcat Connectors (mod_jk) Information Disclosure

  • To: THREDDS community <thredds@xxxxxxxxxxxxxxxx>
  • Subject: [thredds] Fwd: [SECURITY] CVE-2023-41081 Apache Tomcat Connectors (mod_jk) Information Disclosure
  • From: Jennifer Oxelson Ganter <oxelson@xxxxxxxx>
  • Date: Wed, 13 Sep 2023 13:19:29 -0600
Hello all,

If you have your TDS server behind a reverse proxy and are using mod_jdk,
please note the following CVE for the associated connector.



---------- Forwarded message ---------
From: Mark Thomas <markt@xxxxxxxxxx>
Date: Wed, Sep 13, 2023 at 3:30 AM
Subject: [SECURITY] CVE-2023-41081 Apache Tomcat Connectors (mod_jk)
Information Disclosure
To: users@xxxxxxxxxxxxxxxxx <users@xxxxxxxxxxxxxxxxx>
Cc: announce@xxxxxxxxxxxxxxxxx <announce@xxxxxxxxxxxxxxxxx>, <
announce@xxxxxxxxxx>, dev@xxxxxxxxxxxxxxxxx <dev@xxxxxxxxxxxxxxxxx>


CVE-2023-41081 Apache Tomcat Connectors (mod_jk) Information Disclosure

Severity: Important

Vendor: The Apache Software Foundation

Versions Affected:
- Apache Tomcat Connectors mod_jk Connector 1.2.0 to 1.2.48

Description:
In some circumstances, such as when a configuration included
"JkOptions +ForwardDirectories" but the configuration did not provide
explicit mounts for all possible proxied requests, mod_jk would use an
implicit mapping and map the request to the first defined worker. Such
an implicit mapping could result in the unintended exposure of the
status worker and/or bypass security constraints configured in httpd. As
of JK 1.2.49, the implicit mapping functionality has been removed and
all mappings must now be via explicit configuration.
Only mod_jk is affected by this issue. The ISAPI redirector is not affected .

Mitigation:
Users of affected versions should apply one of the following mitigations:
- Upgrade to Apache Tomcat Connector (mod_jk) 1.2.49 or later.
- Ensure explicit mounts are configured for all possible proxied
   requests

Credit:
This vulnerability was reported responsibly to the Tomcat security team
by Karl von Randow.

References:
[1] http://tomcat.apache.org/security-jk.html
  • 2023 messages navigation, sorted by:
    1. Thread
    2. Subject
    3. Author
    4. Date
    5. ↑ Table Of Contents
  • Search the thredds archives: