2.6

CVE-2008-5519

Exploit

The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.

Daten sind bereitgestellt durch National Vulnerability Database (NVD)
ApacheMod Jk Version1.2
ApacheMod Jk Version1.2.1
ApacheMod Jk Version1.2.6
ApacheMod Jk Version1.2.7
ApacheMod Jk Version1.2.8
ApacheMod Jk Version1.2.9
ApacheMod Jk Version1.2.10
ApacheMod Jk Version1.2.11
ApacheMod Jk Version1.2.12
ApacheMod Jk Version1.2.13
ApacheMod Jk Version1.2.14
ApacheMod Jk Version1.2.14.1
ApacheMod Jk Version1.2.15
ApacheMod Jk Version1.2.16
ApacheMod Jk Version1.2.17
ApacheMod Jk Version1.2.18
ApacheMod Jk Version1.2.19
ApacheMod Jk Version1.2.20
ApacheMod Jk Version1.2.21
ApacheMod Jk Version1.2.22
ApacheMod Jk Version1.2.23
ApacheMod Jk Version1.2.24
ApacheMod Jk Version1.2.25
ApacheMod Jk Version1.2.26
ApacheTomcat Version4.0.0
ApacheTomcat Version4.0.1
ApacheTomcat Version4.0.2
ApacheTomcat Version4.0.3
ApacheTomcat Version4.0.4
ApacheTomcat Version4.0.5
ApacheTomcat Version4.0.6
ApacheTomcat Version4.1.0
ApacheTomcat Version4.1.1
ApacheTomcat Version4.1.2
ApacheTomcat Version4.1.3
ApacheTomcat Version4.1.3 Updatebeta
ApacheTomcat Version4.1.4
ApacheTomcat Version4.1.5
ApacheTomcat Version4.1.6
ApacheTomcat Version4.1.7
ApacheTomcat Version4.1.8
ApacheTomcat Version4.1.9
ApacheTomcat Version4.1.9 Updatebeta
ApacheTomcat Version4.1.10
ApacheTomcat Version4.1.11
ApacheTomcat Version4.1.12
ApacheTomcat Version4.1.13
ApacheTomcat Version4.1.14
ApacheTomcat Version4.1.15
ApacheTomcat Version4.1.16
ApacheTomcat Version4.1.17
ApacheTomcat Version4.1.18
ApacheTomcat Version4.1.19
ApacheTomcat Version4.1.20
ApacheTomcat Version4.1.21
ApacheTomcat Version4.1.22
ApacheTomcat Version4.1.23
ApacheTomcat Version4.1.24
ApacheTomcat Version4.1.25
ApacheTomcat Version4.1.26
ApacheTomcat Version4.1.27
ApacheTomcat Version4.1.28
ApacheTomcat Version4.1.29
ApacheTomcat Version4.1.30
ApacheTomcat Version4.1.31
ApacheTomcat Version4.1.32
ApacheTomcat Version4.1.33
ApacheTomcat Version4.1.34
ApacheTomcat Version4.1.35
ApacheTomcat Version4.1.36
ApacheTomcat Version5.0.0
ApacheTomcat Version5.0.1
ApacheTomcat Version5.0.2
ApacheTomcat Version5.0.3
ApacheTomcat Version5.0.4
ApacheTomcat Version5.0.5
ApacheTomcat Version5.0.6
ApacheTomcat Version5.0.7
ApacheTomcat Version5.0.8
ApacheTomcat Version5.0.9
ApacheTomcat Version5.0.10
ApacheTomcat Version5.0.11
ApacheTomcat Version5.0.12
ApacheTomcat Version5.0.13
ApacheTomcat Version5.0.14
ApacheTomcat Version5.0.15
ApacheTomcat Version5.0.16
ApacheTomcat Version5.0.17
ApacheTomcat Version5.0.18
ApacheTomcat Version5.0.19
ApacheTomcat Version5.0.21
ApacheTomcat Version5.0.22
ApacheTomcat Version5.0.23
ApacheTomcat Version5.0.24
ApacheTomcat Version5.0.25
ApacheTomcat Version5.0.26
ApacheTomcat Version5.0.27
ApacheTomcat Version5.0.28
ApacheTomcat Version5.0.29
ApacheTomcat Version5.0.30
ApacheTomcat Version5.5.0
ApacheTomcat Version5.5.1
ApacheTomcat Version5.5.2
ApacheTomcat Version5.5.3
ApacheTomcat Version5.5.4
ApacheTomcat Version5.5.5
ApacheTomcat Version5.5.6
ApacheTomcat Version5.5.7
ApacheTomcat Version5.5.8
ApacheTomcat Version5.5.9
ApacheTomcat Version5.5.10
ApacheTomcat Version5.5.11
ApacheTomcat Version5.5.12
ApacheTomcat Version5.5.13
ApacheTomcat Version5.5.14
ApacheTomcat Version5.5.15
ApacheTomcat Version5.5.16
ApacheTomcat Version5.5.17
ApacheTomcat Version5.5.18
ApacheTomcat Version5.5.19
ApacheTomcat Version5.5.20
ApacheTomcat Version5.5.21
ApacheTomcat Version5.5.22
ApacheTomcat Version5.5.23
ApacheTomcat Version5.5.24
ApacheTomcat Version5.5.25
ApacheTomcat Version5.5.26
ApacheTomcat Version5.5.27
Zu dieser CVE wurde keine CISA KEV oder CERT.AT-Warnung gefunden.
EPSS Metriken
Typ Quelle Score Percentile
EPSS FIRST.org 4.55% 0.888
CVSS Metriken
Quelle Base Score Exploit Score Impact Score Vector String
nvd@nist.gov 2.6 4.9 2.9
AV:N/AC:H/Au:N/C:P/I:N/A:N
CWE-200 Exposure of Sensitive Information to an Unauthorized Actor

The product exposes sensitive information to an actor that is not explicitly authorized to have access to that information.