Security
Headlines
HeadlinesLatestCVEs

Headline

Ubuntu Security Notice USN-6826-1

Ubuntu Security Notice 6826-1 - Karl von Randow discovered that mod_jk was vulnerable to an authentication bypass. If the configuration did not provide explicit mounts for all possible proxied requests, an attacker could possibly use this vulnerability to bypass security constraints configured in httpd.

Packet Storm
#vulnerability#ubuntu#apache#java#auth

==========================================================================
Ubuntu Security Notice USN-6826-1
June 11, 2024

libapache-mod-jk vulnerability

A security issue affects these releases of Ubuntu and its derivatives:

  • Ubuntu 23.10
  • Ubuntu 22.04 LTS
  • Ubuntu 20.04 LTS
  • Ubuntu 18.04 LTS
  • Ubuntu 16.04 LTS

Summary:

mod_jk could allow unintended access to network services.

Software Description:

  • libapache-mod-jk: Apache 2 connector for the Tomcat Java servlet engine

Details:

Karl von Randow discovered that mod_jk was vulnerable to an authentication
bypass. If the configuration did not provide explicit mounts for all
possible proxied requests, an attacker could possibly use this
vulnerability to bypass security constraints configured in httpd.

Update instructions:

The problem can be corrected by updating your system to the following
package versions:

Ubuntu 23.10
libapache2-mod-jk 1:1.2.48-2ubuntu0.1

Ubuntu 22.04 LTS
libapache2-mod-jk 1:1.2.48-1ubuntu0.1

Ubuntu 20.04 LTS
libapache2-mod-jk 1:1.2.46-1ubuntu0.1

Ubuntu 18.04 LTS
libapache2-mod-jk 1:1.2.43-1ubuntu0.1~esm1
Available with Ubuntu Pro

Ubuntu 16.04 LTS
libapache2-mod-jk 1:1.2.41-1ubuntu0.1~esm1
Available with Ubuntu Pro

In general, a standard system update will make all the necessary changes.

References:
https://ubuntu.com/security/notices/USN-6826-1
CVE-2023-41081

Package Information:
https://launchpad.net/ubuntu/+source/libapache-mod-jk/1:1.2.48-2ubuntu0.1
https://launchpad.net/ubuntu/+source/libapache-mod-jk/1:1.2.48-1ubuntu0.1
https://launchpad.net/ubuntu/+source/libapache-mod-jk/1:1.2.46-1ubuntu0.1

Related news

Red Hat Security Advisory 2024-2387-03

Red Hat Security Advisory 2024-2387-03 - An update for mod_jk and mod_proxy_cluster is now available for Red Hat Enterprise Linux 9. Issues addressed include cross site scripting and information leakage vulnerabilities.

Red Hat Security Advisory 2023-7626-03

Red Hat Security Advisory 2023-7626-03 - Red Hat JBoss Core Services Apache HTTP Server 2.4.57 Service Pack 2 is now available. Issues addressed include buffer overflow, denial of service, information leakage, and integer overflow vulnerabilities.

Red Hat Security Advisory 2023-7625-03

Red Hat Security Advisory 2023-7625-03 - An update is now available for Red Hat JBoss Core Services. Issues addressed include buffer overflow, denial of service, and information leakage vulnerabilities.

CVE-2023-41081

The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected. This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48. Users are recommended to upgrade to version 1.2.49, which fixes the issue.

Packet Storm: Latest News

Acronis Cyber Protect/Backup Remote Code Execution