Files
CVEs-PoC/2018/CVE-2018-1323.md
T
2024-05-26 14:27:05 +02:00

25 lines
1.3 KiB
Markdown

### [CVE-2018-1323](https://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2018-1323)
![](https://img.shields.io/static/v1?label=Product&message=Apache%20Tomcat%20Connectors&color=blue)
![](https://img.shields.io/static/v1?label=Version&message=n%2Fa&color=blue)
![](https://img.shields.io/static/v1?label=Vulnerability&message=Information%20Disclosure&color=brighgreen)
### Description
The IIS/ISAPI specific code in the Apache Tomcat JK ISAPI Connector 1.2.0 to 1.2.42 that normalised the requested path before matching it to the URI-worker map did not handle some edge cases correctly. If only a sub-set of the URLs supported by Tomcat were exposed via IIS, then it was possible for a specially constructed request to expose application functionality through the reverse proxy that was not intended for clients accessing Tomcat via the reverse proxy.
### POC
#### Reference
No PoCs from references.
#### Github
- https://github.com/0xT11/CVE-POC
- https://github.com/ARPSyndicate/cvemon
- https://github.com/Ravaan21/Tomcat-ReverseProxy-Bypasser
- https://github.com/immunIT/CVE-2018-11759
- https://github.com/lnick2023/nicenice
- https://github.com/qazbnm456/awesome-cve-poc
- https://github.com/tharmigaloganathan/ECE9069-Presentation-2
- https://github.com/xbl3/awesome-cve-poc_qazbnm456