MGASA-2024-0130

Source
https://advisories.mageia.org/MGASA-2024-0130.html
Import Source
https://advisories.mageia.org/MGASA-2024-0130.json
JSON Data
https://api.test.osv.dev/v1/vulns/MGASA-2024-0130
Related
Published
2024-04-13T16:56:38Z
Modified
2024-04-13T16:34:40Z
Summary
Updated apache-mod_jk packages fix security vulnerability
Details

The modjk component of Apache Tomcat Connectors in some circumstances, such as when a configuration included "JkOptions +ForwardDirectories" but the configuration did not provide explicit mounts for all possible proxied requests, modjk would use an implicit mapping and map the request to the first defined worker. Such an implicit mapping could result in the unintended exposure of the status worker and/or bypass security constraints configured in httpd. As of JK 1.2.49, the implicit mapping functionality has been removed and all mappings must now be via explicit configuration. (CVE-2023-41081)

References
Credits

Affected packages

Mageia:9 / apache-mod_jk

Package

Name
apache-mod_jk
Purl
pkg:rpm/mageia/apache-mod_jk?distro=mageia-9

Affected ranges

Type
ECOSYSTEM
Events
Introduced
0Unknown introduced version / All previous versions are affected
Fixed
1.2.49-1.mga9

Ecosystem specific

{
    "section": "core"
}