mod_jk-1.2.49-1.el9, mod_proxy_cluster-1.3.20-1.el9
エラータID: AXSA:2024-7930:01
The mod_jk module is a plugin for the Apache HTTP Server to connect it with the Apache Tomcat servlet engine.
The mod_proxy_cluster module is a plugin for the Apache HTTP Server that provides load-balancer functionality.
Security Fix(es):
* httpd: Apache Tomcat Connectors (mod_jk) Information Disclosure (CVE-2023-41081)
* mod_cluster/mod_proxy_cluster: Stored Cross site Scripting (CVE-2023-6710)
For more details about the security issue(s), including the impact, a CVSS score, acknowledgments, and other related information, refer to the CVE page(s) listed in the References section.
Additional Changes:
For detailed information on changes in this release, see the MIRACLE LINUX 9.4 Release Notes linked from the References section.
CVE-2023-41081
Important: Authentication Bypass CVE-2023-41081 The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected. This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48. Users are recommended to upgrade to version 1.2.49, which fixes the issue. History 2023-09-13 Original advisory 2023-09-28 Updated summary
CVE-2023-6710
A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.
Update packages.
Important: Authentication Bypass CVE-2023-41081 The mod_jk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, mod_jk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. Only mod_jk is affected by this issue. The ISAPI redirector is not affected. This issue affects Apache Tomcat Connectors (mod_jk only): from 1.2.0 through 1.2.48. Users are recommended to upgrade to version 1.2.49, which fixes the issue. History 2023-09-13 Original advisory 2023-09-28 Updated summary
A flaw was found in the mod_proxy_cluster in the Apache server. This issue may allow a malicious user to add a script in the 'alias' parameter in the URL to trigger the stored cross-site scripting (XSS) vulnerability. By adding a script on the alias parameter on the URL, it adds a new virtual host and adds the script to the cluster-manager page.
N/A
SRPMS
- mod_jk-1.2.49-1.el9.src.rpm
MD5: d981fea5ea919fbe1d28eeccf3234079
SHA-256: cf0827ee525d0e6e30ec2e1c31be9fe7cf9503cf100f4513cbae153ebbe8b606
Size: 1.03 MB - mod_proxy_cluster-1.3.20-1.el9.src.rpm
MD5: e1cf000030a2874dfccc14fb389861e0
SHA-256: ba1c6468338ffb960e7e6afbf764e4df25e5b570cb623cb9abc109e57b6c5880
Size: 485.64 kB
Asianux Server 9 for x86_64
- mod_jk-1.2.49-1.el9.x86_64.rpm
MD5: 0ce6cf389d076f4fe131b03b4a12ae3f
SHA-256: 27db203740a9b1072ee039977ced59828d8bab0d102520c4f0817ae1bc61b386
Size: 189.75 kB - mod_proxy_cluster-1.3.20-1.el9.x86_64.rpm
MD5: ad808a9e569e2e8bffedd1384c8b6aa8
SHA-256: eeb79c0f48d15a3f97172fb6f44322f219320ce2d8fe08bc591240f10f7667da
Size: 94.04 kB