The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
References
History
No history.
MITRE Information
Status: PUBLISHED
Assigner: redhat
Published: 2009-04-09T15:00:00
Updated: 2020-02-13T16:10:22
Reserved: 2008-12-12T00:00:00
Link: CVE-2008-5519
JSON object: View
NVD Information
Status : Modified
Published: 2009-04-09T15:08:35.500
Modified: 2023-02-13T02:19:35.903
Link: CVE-2008-5519
JSON object: View
Redhat Information
No data.
CWE