Vulnerabilities > CVE-2007-0774 - Unspecified vulnerability in Apache Tomcat JK web Server Connector 1.2.19/1.2.20

047910
CVSS 0.0 - NONE
Attack vector
UNKNOWN
Attack complexity
UNKNOWN
Privileges required
UNKNOWN
Confidentiality impact
UNKNOWN
Integrity impact
UNKNOWN
Availability impact
UNKNOWN
apache
nessus
exploit available
metasploit

Summary

Stack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.

Vulnerable Configurations

Part Description Count
Application
Apache
2

Exploit-Db

descriptionApache mod_jk 1.2.20 Buffer Overflow. CVE-2007-0774. Remote exploit for windows platform
idEDB-ID:16798
last seen2016-02-02
modified2010-07-25
published2010-07-25
reportermetasploit
sourcehttps://www.exploit-db.com/download/16798/
titleApache mod_jk 1.2.20 - Buffer Overflow

Metasploit

descriptionThis is a stack buffer overflow exploit for mod_jk 1.2.20. Should work on any Win32 OS.
idMSF:EXPLOIT/WINDOWS/HTTP/APACHE_MODJK_OVERFLOW
last seen2020-06-14
modified2017-07-24
published2007-05-22
referenceshttps://cve.mitre.org/cgi-bin/cvename.cgi?name=CVE-2007-0774
reporterRapid7
sourcehttps://github.com/rapid7/metasploit-framework/blob/master//modules/exploits/windows/http/apache_modjk_overflow.rb
titleApache mod_jk 1.2.20 Buffer Overflow

Nessus

  • NASL familyFreeBSD Local Security Checks
    NASL idFREEBSD_PKG_CF86C644CB6C11DB8E9D000C6EC775D9.NASL
    descriptionTippingPoint and The Zero Day Initiative reports : This vulnerability allows remote attackers to execute arbitrary code on vulnerable installations of Apache Tomcat JK Web Server Connector. Authentication is not required to exploit this vulnerability. The specific flaw exists in the URI handler for the mod_jk.so library, map_uri_to_worker(), defined in native/common/jk_uri_worker_map.c. When parsing a long URL request, the URI worker map routine performs an unsafe memory copy. This results in a stack overflow condition which can be leveraged to execute arbitrary code.
    last seen2020-06-01
    modified2020-06-02
    plugin id24770
    published2007-03-06
    reporterThis script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.
    sourcehttps://www.tenable.com/plugins/nessus/24770
    titleFreeBSD : mod_jk -- long URL stack overflow vulnerability (cf86c644-cb6c-11db-8e9d-000c6ec775d9)
    code
    #%NASL_MIN_LEVEL 80502
    #
    # (C) Tenable Network Security, Inc.
    #
    # The descriptive text and package checks in this plugin were  
    # extracted from the FreeBSD VuXML database :
    #
    # Copyright 2003-2018 Jacques Vidrine and contributors
    #
    # Redistribution and use in source (VuXML) and 'compiled' forms (SGML,
    # HTML, PDF, PostScript, RTF and so forth) with or without modification,
    # are permitted provided that the following conditions are met:
    # 1. Redistributions of source code (VuXML) must retain the above
    #    copyright notice, this list of conditions and the following
    #    disclaimer as the first lines of this file unmodified.
    # 2. Redistributions in compiled form (transformed to other DTDs,
    #    published online in any format, converted to PDF, PostScript,
    #    RTF and other formats) must reproduce the above copyright
    #    notice, this list of conditions and the following disclaimer
    #    in the documentation and/or other materials provided with the
    #    distribution.
    # 
    # THIS DOCUMENTATION IS PROVIDED BY THE AUTHOR AND CONTRIBUTORS "AS IS"
    # AND ANY EXPRESS OR IMPLIED WARRANTIES, INCLUDING, BUT NOT LIMITED TO,
    # THE IMPLIED WARRANTIES OF MERCHANTABILITY AND FITNESS FOR A PARTICULAR
    # PURPOSE ARE DISCLAIMED. IN NO EVENT SHALL THE AUTHOR OR CONTRIBUTORS
    # BE LIABLE FOR ANY DIRECT, INDIRECT, INCIDENTAL, SPECIAL, EXEMPLARY,
    # OR CONSEQUENTIAL DAMAGES (INCLUDING, BUT NOT LIMITED TO, PROCUREMENT
    # OF SUBSTITUTE GOODS OR SERVICES; LOSS OF USE, DATA, OR PROFITS; OR
    # BUSINESS INTERRUPTION) HOWEVER CAUSED AND ON ANY THEORY OF LIABILITY,
    # WHETHER IN CONTRACT, STRICT LIABILITY, OR TORT (INCLUDING NEGLIGENCE
    # OR OTHERWISE) ARISING IN ANY WAY OUT OF THE USE OF THIS DOCUMENTATION,
    # EVEN IF ADVISED OF THE POSSIBILITY OF SUCH DAMAGE.
    #
    
    include("compat.inc");
    
    if (description)
    {
      script_id(24770);
      script_version("1.16");
      script_cvs_date("Date: 2019/08/02 13:32:39");
    
      script_cve_id("CVE-2007-0774");
    
      script_name(english:"FreeBSD : mod_jk -- long URL stack overflow vulnerability (cf86c644-cb6c-11db-8e9d-000c6ec775d9)");
      script_summary(english:"Checks for updated packages in pkg_info output");
    
      script_set_attribute(
        attribute:"synopsis", 
        value:
    "The remote FreeBSD host is missing one or more security-related
    updates."
      );
      script_set_attribute(
        attribute:"description", 
        value:
    "TippingPoint and The Zero Day Initiative reports :
    
    This vulnerability allows remote attackers to execute arbitrary code
    on vulnerable installations of Apache Tomcat JK Web Server Connector.
    Authentication is not required to exploit this vulnerability.
    
    The specific flaw exists in the URI handler for the mod_jk.so library,
    map_uri_to_worker(), defined in native/common/jk_uri_worker_map.c.
    When parsing a long URL request, the URI worker map routine performs
    an unsafe memory copy. This results in a stack overflow condition
    which can be leveraged to execute arbitrary code."
      );
      script_set_attribute(
        attribute:"see_also",
        value:"http://tomcat.apache.org/security-jk.html"
      );
      # http://www.zerodayinitiative.com/advisories/ZDI-07-008.html
      script_set_attribute(
        attribute:"see_also",
        value:"https://www.zerodayinitiative.com/advisories/ZDI-07-008.html"
      );
      # https://vuxml.freebsd.org/freebsd/cf86c644-cb6c-11db-8e9d-000c6ec775d9.html
      script_set_attribute(
        attribute:"see_also",
        value:"http://www.nessus.org/u?b794f640"
      );
      script_set_attribute(attribute:"solution", value:"Update the affected packages.");
      script_set_cvss_base_vector("CVSS2#AV:N/AC:L/Au:N/C:P/I:P/A:P");
      script_set_attribute(attribute:"exploitability_ease", value:"Exploits are available");
      script_set_attribute(attribute:"exploit_available", value:"true");
      script_set_attribute(attribute:"exploit_framework_core", value:"true");
      script_set_attribute(attribute:"metasploit_name", value:'Apache mod_jk 1.2.20 Buffer Overflow');
      script_set_attribute(attribute:"exploit_framework_metasploit", value:"true");
      script_set_attribute(attribute:"exploit_framework_canvas", value:"true");
      script_set_attribute(attribute:"canvas_package", value:'D2ExploitPack');
    
      script_set_attribute(attribute:"plugin_type", value:"local");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mod_jk");
      script_set_attribute(attribute:"cpe", value:"p-cpe:/a:freebsd:freebsd:mod_jk-ap2");
      script_set_attribute(attribute:"cpe", value:"cpe:/o:freebsd:freebsd");
    
      script_set_attribute(attribute:"vuln_publication_date", value:"2007/03/02");
      script_set_attribute(attribute:"patch_publication_date", value:"2007/03/05");
      script_set_attribute(attribute:"plugin_publication_date", value:"2007/03/06");
      script_end_attributes();
    
      script_category(ACT_GATHER_INFO);
      script_copyright(english:"This script is Copyright (C) 2007-2019 and is owned by Tenable, Inc. or an Affiliate thereof.");
      script_family(english:"FreeBSD Local Security Checks");
    
      script_dependencies("ssh_get_info.nasl");
      script_require_keys("Host/local_checks_enabled", "Host/FreeBSD/release", "Host/FreeBSD/pkg_info");
    
      exit(0);
    }
    
    
    include("audit.inc");
    include("freebsd_package.inc");
    
    
    if (!get_kb_item("Host/local_checks_enabled")) audit(AUDIT_LOCAL_CHECKS_NOT_ENABLED);
    if (!get_kb_item("Host/FreeBSD/release")) audit(AUDIT_OS_NOT, "FreeBSD");
    if (!get_kb_item("Host/FreeBSD/pkg_info")) audit(AUDIT_PACKAGE_LIST_MISSING);
    
    
    flag = 0;
    
    if (pkg_test(save_report:TRUE, pkg:"mod_jk-ap2>=1.2.19<1.2.21")) flag++;
    if (pkg_test(save_report:TRUE, pkg:"mod_jk>=1.2.19<1.2.21")) flag++;
    
    if (flag)
    {
      if (report_verbosity > 0) security_hole(port:0, extra:pkg_report_get());
      else security_hole(0);
      exit(0);
    }
    else audit(AUDIT_HOST_NOT, "affected");
    
  • NASL familyCGI abuses
    NASL idMOD_JK_LONG_URL_OVERFLOW.NASL
    descriptionAccording to its banner, the version of the Apache mod_jk module in use on the remote web server contains a buffer overflow vulnerability. An unauthenticated, remote attacker may be able to exploit this flaw by sending a long URL request to crash the affected service or execute arbitrary code on the remote host, subject to the privileges of the web server user id.
    last seen2020-06-01
    modified2020-06-02
    plugin id24813
    published2007-03-15
    reporterThis script is Copyright (C) 2007-2018 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24813
    titleApache mod_jk Long URL Worker Map Stack Remote Overflow
  • NASL familyGentoo Local Security Checks
    NASL idGENTOO_GLSA-200703-16.NASL
    descriptionThe remote host is affected by the vulnerability described in GLSA-200703-16 (Apache JK Tomcat Connector: Remote execution of arbitrary code) ZDI reported an unsafe memory copy in mod_jk that was discovered by an anonymous researcher in the map_uri_to_worker function of native/common/jk_uri_worker_map.c . Impact : A remote attacker can send a long URL request to an Apache server using Tomcat. That can trigger the vulnerability and lead to a stack-based buffer overflow, which could result in the execution of arbitrary code with the permissions of the Apache user. Workaround : There is no known workaround at this time.
    last seen2020-06-01
    modified2020-06-02
    plugin id24841
    published2007-03-18
    reporterThis script is Copyright (C) 2007-2019 Tenable Network Security, Inc.
    sourcehttps://www.tenable.com/plugins/nessus/24841
    titleGLSA-200703-16 : Apache JK Tomcat Connector: Remote execution of arbitrary code

Oval

accepted2015-04-20T04:02:25.877-04:00
classvulnerability
contributors
  • nameMichael Wood
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
  • nameSushant Kumar Singh
    organizationHewlett-Packard
  • namePrashant Kumar
    organizationHewlett-Packard
  • nameMike Cokus
    organizationThe MITRE Corporation
descriptionStack-based buffer overflow in the map_uri_to_worker function (native/common/jk_uri_worker_map.c) in mod_jk.so for Apache Tomcat JK Web Server Connector 1.2.19 and 1.2.20, as used in Tomcat 4.1.34 and 5.5.20, allows remote attackers to execute arbitrary code via a long URL that triggers the overflow in a URI worker map routine.
familyunix
idoval:org.mitre.oval:def:5513
statusaccepted
submitted2008-10-30T17:10:24.000-04:00
titleHP-UX running Apache, Remote Arbitrary Code Execution, Cross Site Scripting (XSS)
version45

Packetstorm

data sourcehttps://packetstormsecurity.com/files/download/57551/apache_modjk_overflow.rb.txt
idPACKETSTORM:57551
last seen2016-12-05
published2007-07-10
reporterNicob
sourcehttps://packetstormsecurity.com/files/57551/apache_modjk_overflow.rb.txt.html
titleapache_modjk_overflow.rb.txt

Redhat

advisories
rhsa
idRHSA-2007:0096
rpms
  • mod_jk-ap20-0:1.2.20-1.el4s1.2
  • mod_jk-debuginfo-0:1.2.20-1.el4s1.2
  • mod_jk-manual-0:1.2.20-1.el4s1.2
  • mod_jk-ap20-0:1.2.20-1jpp_1rh
  • mod_jk-debuginfo-0:1.2.20-1jpp_1rh
  • mod_jk-manual-0:1.2.20-1jpp_1rh

Saint

bid22791
descriptionApache Tomcat JK Web Server Connector URI worker map buffer overflow
idweb_mod_jkver
osvdb33855
titletomcat_jk_connector_worker_map
typeremote

References