Description
The JK status manager is an administration interface for mod_jk.
Due to discrepancies between the specifications of httpd and Tomcat for path resolution, Apache mod_jk Connector 1.2.0 to 1.2.44 access controls to endpoints defined by a JkMount httpd directive can be bypassed.
Notably, if a read-only JK status manager interface is available, it is possible to disclose the internal routes of AJP
services served by mod_jk.
Furthermore, if a read-write JK status manager interface is available, it is possible to hijack or shutdown all traffic traversing mod_jk by altering the configuration of AJP workers, or to conduct internal port scanning.
Remediation
A patch is available for mod_jk (version 1.2.46).
Other mitigations include the use of Location values such as /jkstatus*, which seems to fix the issue.
References
Related Vulnerabilities
XWiki Server-Side Request Forgery (SSRF) Vulnerability (CVE-2023-48240)
PHP HTTP POST incorrect MIME header parsing vulnerability
WordPress 3.9.x Multiple Vulnerabilities (3.9 - 3.9.28)
WordPress Server-Side Request Forgery (SSRF) Vulnerability (CVE-2016-4029)
WordPress Plugin All-in-One Video Gallery Multiple Vulnerabilities (2.6.0)