Apache Tomcat Mod_JK.SO Arbitrary Code Execution Vulnerability
BID:22791
Info
Apache Tomcat Mod_JK.SO Arbitrary Code Execution Vulnerability
| Bugtraq ID: | 22791 |
| Class: | Design Error |
| CVE: |
CVE-2007-0774 |
| Remote: | Yes |
| Local: | No |
| Published: | Mar 02 2007 12:00AM |
| Updated: | Jul 21 2008 05:38PM |
| Credit: | An anonymous researcher reported this issue. |
| Vulnerable: |
HP HP-UX B.11.31 HP HP-UX B.11.23 HP HP-UX B.11.11 Gentoo Linux Cisco Wireless Control System Software 4.0.96 Cisco Wireless Control System Software 4.0.96 Cisco Wireless Control System Software 4.0.95 Cisco Wireless Control System Software 4.0 Cisco Wireless Control System Software 4.0 Cisco Wireless Control System Software 4.1 Cisco Wireless Control System Software 3.2 Cisco Wireless Control System for Windows 0 Cisco Wireless Control System for Linux 0 Cisco Wireless Control System 4.2 Cisco Wireless Control System 4.1.91.0 Cisco Wireless Control System 0 Apache Tomcat 5.5.20 Apache Tomcat 4.1.34 Apache mod_jk 1.2.20 Apache mod_jk 1.2.19 |
| Not Vulnerable: |
Cisco Wireless Control System 4.2.62 .0 Cisco Wireless Control System 4.0.100 .0 Apache mod_jk 1.2.21 |
Discussion
Apache Tomcat Mod_JK.SO Arbitrary Code Execution Vulnerability
Apache Tomcat is prone to a vulnerability that will allow remote attackers to execute arbitrary code on an affected computer. A successful attack may result in a complete compromise.
Apache Tomcat is prone to a vulnerability that will allow remote attackers to execute arbitrary code on an affected computer. A successful attack may result in a complete compromise.
Exploit / POC
Apache Tomcat Mod_JK.SO Arbitrary Code Execution Vulnerability
UPDATE: Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
The following Metasploit framework exploit module is available.
Exploit code (by unohope) is also available.
UPDATE: Core Security Technologies has developed a working commercial exploit for its CORE IMPACT product. This exploit is not otherwise publicly available or known to be circulating in the wild.
The following Metasploit framework exploit module is available.
Exploit code (by unohope) is also available.
Solution / Fix
Apache Tomcat Mod_JK.SO Arbitrary Code Execution Vulnerability
Solution:
The vendor has released a fix. Please see the references for more information.
Apache mod_jk 1.2.19
Apache mod_jk 1.2.20
Solution:
The vendor has released a fix. Please see the references for more information.
Apache mod_jk 1.2.19
-
Apache Software Foundation tomcat-connectors-1.2.21-src.tar.gz
http://www.apache.org/dist/tomcat/tomcat-connectors/jk/source/jk-1.2.2 1/tomcat-connectors-1.2.21-src.tar.gz
Apache mod_jk 1.2.20
-
Apache Software Foundation tomcat-connectors-1.2.21-src.tar.gz
http://www.apache.org/dist/tomcat/tomcat-connectors/jk/source/jk-1.2.2 1/tomcat-connectors-1.2.21-src.tar.gz
References
Apache Tomcat Mod_JK.SO Arbitrary Code Execution Vulnerability
References:
References:
- Apache Tomcat Homepage (Apache)
- The Apache Tomcat Connector - Miscellaneous Documentation (Apache)
- Cisco Security Advisory: Cisco Wireless Control System Tomcat mod_jk.so Vulnerab (Cisco Systems Product Security Incident Response Team
) - HPSBUX02262 SSRT071447 rev. 1 (Hewlett-Packard)
- ZDI-07-008: Apache Tomcat JK Web Server Connector Long URL Stack Overflow Vulner ([email protected])
- Cisco Applied Mitigation Bulletin: Identifying and Mitigating Exploitation of th (Cisco)
- Cisco Security Advisory: Cisco Wireless Control System Tomcat mod_jk.so Vulnerab (Cisco)