CVE-2018-11759

The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK...

Basic Information

CVE State
PUBLISHED
Reserved Date
June 05, 2018
Published Date
October 31, 2018
Last Updated
August 05, 2024
Vendor
Apache Software Foundation
Product
Apache Tomcat Connectors
Description
The Apache Web Server (httpd) specific code that normalised the requested path before matching it to the URI-worker map in Apache Tomcat JK (mod_jk) Connector 1.2.0 to 1.2.44 did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via httpd, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing the application via the reverse proxy. It was also possible in some configurations for a specially constructed request to bypass the access controls configured in httpd. While there is some overlap between this issue and CVE-2018-1323, they are not identical.

CVSS Scores

EPSS Score

Score
94.18% (Percentile: 99.90%) as of 2025-04-29

Exploit Status

Exploited in the Wild
Yes (added 2025-04-24 00:00:00 UTC) Source

Known Exploited Vulnerability Information

Source Added Date
The Shadowserver (via CIRCL) 2025-04-24 00:00:00 UTC

Scanner Integrations

Potential Proof of Concepts

Warning: These PoCs have not been tested and could contain malware. Use at your own risk.

julioliraup/Identificador-CVE-2018-11759

Type: github • Created: 2024-04-18 14:28:11 UTC • Stars: 0

Jul10l1r4/Identificador-CVE-2018-11759

Type: github • Created: 2018-12-08 02:32:14 UTC • Stars: 5

This exploit for CVE 2018-11759, vulnerability in apache mod_jk, module for load-balancer

immunIT/CVE-2018-11759

Type: github • Created: 2018-11-01 09:11:07 UTC • Stars: 41

Proof of concept showing how to exploit the CVE-2018-11759