The JK Connector (aka mod_jk) 1.2.0 through 1.2.26 in Apache Tomcat allows remote attackers to obtain sensitive information via an arbitrary request from an HTTP client, in opportunistic circumstances involving (1) a request from a different client that included a Content-Length header but no POST data or (2) a rapid series of requests, related to noncompliance with the AJP protocol's requirements for requests containing Content-Length headers.
Metrics
Affected Vendors & Products
References
History
No history.

Status: PUBLISHED
Assigner: redhat
Published:
Updated: 2024-08-07T10:56:46.621Z
Reserved: 2008-12-12T00:00:00
Link: CVE-2008-5519

No data.

Status : Modified
Published: 2009-04-09T15:08:35.500
Modified: 2024-11-21T00:54:14.650
Link: CVE-2008-5519
