GNK G
2018-11-22 16:19:40 UTC
Hello Team,
According to the below link, we can check the vulnerability using "status"
worker
https://www.immunit.ch/blog/2018/11/01/cve-2018-11759-apache-mod_jk-access-bypass/
I am able to simulate the issue using the above method.
But it is specific only to "status" worker.
Does that mean, the issue is only specific to "status" worker, if we don't
use it, is it not vulnerable.
I am trying the same method in other URL (by appending ;) in our server, it
is always going for authentication. So can I assume, it does not affect
other part in our server.
Could some one please provide input on this?
Thanks,,
Navanee
According to the below link, we can check the vulnerability using "status"
worker
https://www.immunit.ch/blog/2018/11/01/cve-2018-11759-apache-mod_jk-access-bypass/
I am able to simulate the issue using the above method.
But it is specific only to "status" worker.
Does that mean, the issue is only specific to "status" worker, if we don't
use it, is it not vulnerable.
I am trying the same method in other URL (by appending ;) in our server, it
is always going for authentication. So can I assume, it does not affect
other part in our server.
Could some one please provide input on this?
Thanks,,
Navanee